Épisodes

  • 100 Episodes of Protect It All: Aaron Crow’s Journey Through IT, OT & Cybersecurity
    Apr 6 2026

    In this special milestone episode of Protect It All, host Aaron Crow steps away from the usual format to share his personal journey - from early days working with PLCs at a kitchen table to building a platform that connects and educates cybersecurity professionals around the world.

    This episode is more than a reflection - it’s a story of persistence, curiosity, and community.

    Aaron walks through the evolution of IT and OT cybersecurity, the lessons learned from decades in the field, and how conversations with experts across 100 episodes have shaped his perspective on what it truly means to “Protect It All.”

    You’ll hear:

    • How Aaron’s career in IT and OT began - and what kept him going
    • The biggest lessons learned across 30+ years in cybersecurity
    • What building a podcast taught him about community and leadership
    • How the industry has evolved - and what still hasn’t changed
    • Why relationships and shared knowledge matter more than ever
    • What’s next for the future of cybersecurity and the podcast

    Whether you’ve been listening since episode one or you’re just discovering the show, this episode offers inspiration, perspective, and a deeper look behind the mic.

    Tune in to celebrate 100 episodes and the journey of protecting what matters most - only on Protect It All.

    Key Moments:

    04:12 Early tech projects and hobbies

    09:31 First tech job setting up classrooms

    11:20 Getting certified in IT

    16:49 Early career in power and cybersecurity

    18:08 Building a versatile IT team

    24:23 Starting the cybersecurity podcast journey

    26:28 Feeling recognized in the podcast world

    29:22 Getting started in cybersecurity

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    32 min
  • OT Cybersecurity That Works: Budgets, Soft Skills & AI Reality for Stronger Defense
    Mar 30 2026

    Strong OT cybersecurity programs aren’t built on tools alone, they're built on strategy, communication, and smart investment.

    In this episode of Protect It All, host Aaron Crow is joined by cybersecurity expert Don C. Weber for a candid, real-world discussion on what it actually takes to build and sustain effective security programs across IT and OT environments.

    From CapEx vs OpEx decisions to the growing role of AI in both attack and defense, this conversation cuts through the noise and focuses on what drives real outcomes: understanding business workflows, aligning with leadership, and developing the soft skills needed to turn strategy into action.

    You’ll learn:

    • Why budgeting (CapEx vs OpEx) directly impacts security success
    • The underrated power of soft skills in driving security programs
    • How to connect cybersecurity efforts to business value and operations
    • The role of pen testing and assessments in improving maturity
    • Where AI adds value and where it introduces new risk
    • How training and process understanding strengthen long-term resilience

    Whether you’re building a new security program or scaling an existing one, this episode delivers practical, experience-driven insights to help you make smarter decisions and drive real impact.

    Tune in to learn how to align strategy, people, and investment for stronger OT cybersecurity only on Protect It All.

    Key Moments:

    05:49 Technical skills and security requirements

    09:10 Understanding data workflows

    12:29 Building a vulnerability management program

    13:26 Understanding organizational decision history

    17:44 Budgeting challenges with CAPEX and OPEX

    21:36 Steps in a security assessment

    24:17 Starting a cybersecurity program

    28:02 Prioritizing remote access security

    31:21 Discussing AI's impact on cybersecurity

    32:55 Using AI in cybersecurity

    38:07 AI simplifying complex knowledge

    40:35 AI tools making data queries easier

    45:02 Detecting and responding faster

    46:05 Networking and shared experiences

    About the guest:

    Don C. Weber is a visionary cybersecurity leader who helps defenders safely prove security where it matters most in industrial operations. He is a SANS Principal Instructor, Founder of Cutaway Security, co-author of SANS ICS613: ICS/OT Penetration Testing & Assessments, and he also teaches SANS ICS410: ICS/SCADA Security Essentials to SANS student around the world. He brings years of field work into creating step-by-step labs and planning methods teams can use right away.

    How to connect Don:

    LinkedIn: https://www.linkedin.com/in/cutaway/

    Cutaway Security: https://www.linkedin.com/company/cutaway-security-llc

    CutSec Github: https://github.com/cutaway-security

    CutSec GasPot HMI Lab: https://github.com/cutaway-security/gaspot-hmi-lab

    SANS ICS ICS613 ICS/OT Penetration Testing and Assessments: https://www.sans.org/cyber-security-courses/ics-ot-penetration-testing-assessments

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    L...

    Afficher plus Afficher moins
    52 min
  • The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
    Mar 23 2026

    Cyberattacks don’t just test your systems - they test your preparedness.

    In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.

    Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.

    A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.

    You’ll learn:

    • What the Striker attack teaches about modern cyber warfare
    • How living-off-the-land tactics bypass traditional defenses
    • Why tabletop exercises are essential for real-world readiness
    • The role of threat hunting and collaboration across teams
    • How attackers exploit weaknesses in both IT and OT environments
    • Why small, consistent actions can dramatically improve resilience

    Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.

    Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.

    Key Moments:

    04:59 "Modern Warfare: Cyber and Beyond"

    08:47 "Security Risks of Remote Wipe"

    10:31 "Living Off the Land Tactics"

    13:11 "Balancing Power and Security"

    19:12 "Vulnerabilities Demand Swift Action"

    20:21 Prioritize Risk, Justify Investment

    25:04 Practice Preparedness Before Crisis

    26:48 Weak Links Threaten Cybersecurity

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    32 min
  • OT Under Siege: How to Defend Critical Infrastructure From Nation-State Cyber Threats
    Mar 16 2026

    Global conflicts are no longer confined to physical battlefields - they’re spilling into cyberspace.

    In this urgent episode of Protect It All, host Aaron Crow breaks down the rising wave of cyber threats targeting critical infrastructure, from energy and water utilities to manufacturing and transportation systems.

    Drawing on recent global events and real-world incidents, Aaron explores how nation-state actors, hacktivists, and advanced adversaries are increasingly targeting operational technology environments. These attacks often rely on “living off the land” techniques - leveraging existing tools and access inside networks rather than deploying obvious malware.

    But this episode isn’t about panic. It’s about practical defense.

    Aaron outlines the immediate steps OT security teams can take to strengthen resilience - even with limited resources and tight budgets.

    In this episode, you’ll learn:

    • Why global instability increases cyber risk for critical infrastructure
    • How attackers exploit existing tools using living-off-the-land tactics
    • The importance of vigilance, monitoring, and patching in OT environments
    • Why access control and identity management are critical defenses
    • How organizations can improve security posture without massive investments
    • The role of collaboration and awareness in defending essential systems

    Whether you operate power systems, water facilities, industrial plants, or transportation infrastructure, this episode provides real-world guidance to help you stay ahead of evolving threats.

    Tune in to learn how OT teams can strengthen defenses and protect the systems society depends on - only on Protect It All.

    Key Moments:

    03:41 "Rising Cyber Threats Amid Tensions"

    08:24 Nation-State Cyber Threats Unveiled

    11:23 "Advanced Cybersecurity and Monitoring"

    14:24 Prioritizing and Addressing Security Risks

    17:24 Practical Steps for Cybersecurity Improvements

    19:34 "Focus on Resources and Action"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    23 min
  • Poland’s Power Grid Cyberattack What It Teaches Us About OT Security and Renewable Energy Risks
    Mar 9 2026

    What happens when attackers target the systems that keep the lights on?

    In this episode of Protect It All, host Aaron Crow breaks down the December 2025 cyberattack on Poland’s energy infrastructure, where coordinated attackers disrupted wind farms, solar installations, and heat and power plants - impacting nearly half a million people.

    This real-world incident highlights the growing risks facing distributed energy resources (DER) and modern power grids. As energy systems become more connected and decentralized, the attack surface expands - often faster than security programs can adapt.

    Aaron walks through what actually went wrong: default passwords, unpatched devices, and weak network segmentation that allowed attackers to brick OT equipment and blind operators to what was happening in their own systems.

    You’ll learn:

    • How attackers targeted renewable energy infrastructure at scale
    • Why edge devices and distributed assets create new vulnerabilities
    • The importance of eliminating default credentials and poor configurations
    • Why network segmentation and secure remote access are essential
    • What grid operators and OT teams must prioritize immediately
    • How lessons from Poland apply to power grids worldwide

    For engineers, operators, and cybersecurity leaders responsible for critical infrastructure, this episode delivers practical insights on defending modern energy systems before attackers strike again.

    Tune in to understand what Poland’s grid attack reveals about the future of OT security - only on Protect It All.

    Key Moments:

    04:57 "Corrupted Firmware Disables System Control"

    10:01 DER Risks and Scaling Threats

    10:55 Risks of Expanding Energy Grids

    16:30 OT Security Vulnerabilities and Risks

    18:34 Prioritize OT Security Systems

    23:06 Change Default Passwords Immediately

    24:49 "Critical ICS Security Measures"

    30:15 "OT Cyber-Physical Response Plan"

    32:56 "Critical Security Steps for Resilience"

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    34 min
  • Safe AI Automation for Cybersecurity: Practical Workflows Without the Risk
    Mar 2 2026

    AI can accelerate cybersecurity - or accidentally expose it.

    In this solo episode of Protect It All, host Aaron Crow breaks down how cybersecurity professionals can safely integrate AI into their IT and OT workflows. As tools like ChatGPT, Copilot, and enterprise AI platforms become part of daily operations, the question isn’t whether to use AI - it’s how to use it responsibly.

    Aaron moves beyond buzzwords to focus on practical, everyday applications: automating reports, summarizing threat intelligence, drafting policies, enhancing documentation, and streamlining repetitive tasks. At the same time, he tackles the real concerns leaders face - data privacy, compliance, policy alignment, and shadow AI risks.

    You’ll learn:

    • Where AI delivers immediate value in cybersecurity workflows
    • How to automate without exposing proprietary or regulated data
    • The difference between enterprise AI tools and public platforms
    • How to align AI usage with corporate security policies
    • Practical ways CISOs and analysts can boost productivity safely
    • Why governance and awareness matter as much as innovation

    Whether you’re leading a security program or working hands-on in IT or OT environments, this episode delivers actionable strategies to use AI smarter—not riskier.

    Tune in to learn how to automate with confidence and stay ahead of the curve—only on Protect It All.

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    16 min
  • Compliance Isn’t Security: NERC CIP 15 and the Real Gaps in OT Network Monitoring
    Feb 23 2026

    Passing an audit doesn’t mean you’re secure.

    In this episode of Protect It All, host Aaron Crow dives into one of the biggest misconceptions in operational technology: the belief that compliance equals protection. Using NERC CIP 15 as a real-world case study, Aaron explores why meeting regulatory requirements is only the starting point - not the finish line.

    A major focus of this conversation is OT network monitoring, especially the often-overlooked east-west traffic inside your environment. Many organizations monitor perimeter traffic while internal blind spots remain wide open.

    You’ll learn:

    • Why compliance frameworks don’t automatically create security
    • The real challenges of implementing NERC CIP 15 at scale
    • Why internal network visibility (east-west monitoring) matters
    • How to establish meaningful baselines in legacy OT environments
    • The difference between audit success and operational resilience
    • Why architecture, tooling, and skilled personnel must work together

    Whether you’re working in utilities, manufacturing, or critical infrastructure, this episode provides practical guidance on how to move beyond checklists and build security programs that truly reduce risk.

    Tune in to learn how to transform compliance requirements into real operational protection - only on Protect It All.

    Key Moments:

    00:00 OT Security Blind Spots

    05:15 "OT Security and Monitoring Challenges"

    10:41 Aging Switches and Monitoring Challenges

    13:16 OT Protocols and Infrastructure Challenges

    15:42 "IT vs OT: Complexity Challenges"

    18:03 "Balancing Compliance and Security"

    21:57 Securing Critical Infrastructure Spaces

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X: https://twitter.com/protectitall
    • YouTube: https://www.youtube.com/@PrOTectITAll
    • FaceBook: https://facebook.com/protectitallpodcast

    To be a guest or suggest a guest/episode, please email us at info@protectitall.co

    Please leave us a review on Apple/Spotify Podcasts:

    Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

    Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

    Afficher plus Afficher moins
    23 min
  • OT Cybersecurity That Works: Tabletop Exercises, Critical Controls & Building Trust
    Feb 16 2026

    You can’t secure OT environments with checklists alone - you secure them with trust, clarity, and focused action.

    In this episode of Protect It All, host Aaron Crow sits down with OT security expert Dean Parsons to unpack what actually improves cybersecurity maturity in manufacturing, water, and wastewater environments. From remote access blind spots to outdated network architecture, they explore the practical gaps many organizations face - and how to fix them without massive budgets.

    A central theme? Tabletop exercises. Not as a compliance checkbox - but as a powerful tool to build collaboration between IT and OT teams, clarify roles, and stress-test real incident response plans before a crisis hits.

    You’ll learn:

    • Why tabletop exercises accelerate OT maturity
    • The importance of trust between engineers and IT teams
    • How focusing on the SANS 5 Critical Controls drives meaningful progress
    • Why visibility and architecture matter more than shiny tools
    • How to improve OT security without overwhelming teams or budgets
    • The human and process factors that determine response success

    Whether you’re leading OT security, managing critical infrastructure, or trying to bridge IT and engineering teams, this episode delivers practical, experience-backed strategies you can implement immediately.

    Tune in to learn how to strengthen OT security through people, process, and purposeful action - only on Protect It All.

    Key Moments:

    03:57 "Improved IT-OT Collaboration Tabletops"

    08:57 "ICS Security Priorities"

    12:16 "Accelerating ICS Cybersecurity Programs"

    15:07 Trusted Expertise Builds Credibility

    17:28 "Engineering Role in Incident Response"

    20:53 "Cybersecurity: Tabletops Gain Traction"

    26:34 "Control Systems, Protocol Abuse Insights"

    27:51 Secure Architecture Enables Network Visibility

    33:07 "Targeted Network Monitoring Essentials"

    35:23 Prioritize Critical Assets Strategically

    37:50 "Bridging IT and OT Expertise"

    41:56 Critical Infrastructure Security Risks

    44:30 ICS Leadership and Threat Strategy

    48:14 "Power Plant Walkthrough Insights"

    52:02 Critical Cyber Asset Management

    57:29 "SANS Courses: Essential and Valuable"

    About the guest :

    Dean Parsons is a SANS Principal Instructor and the CEO and Principal Consultant of ICS Defense Force. Over the past two decades, Dean has built and led industrial cyber defense programs, conducted incident response and digital forensics in live plants and partnered with operators and engineers to maintain both safety and uptime across major industrial sectors.

    He helps organizations align investment and policy decisions with operational priorities, developing risk metrics and tabletop exercises that unify operations, engineering, and cybersecurity so organizations in any industrial sector can prioritize and measure what matters.

    How to connect Dean : https://www.linkedin.com/in/dean-parsons-cybersecurity

    Connect With Aaron Crow:

    • Website: www.corvosec.com
    • LinkedIn: https://www.linkedin.com/in/aaronccrow

    Learn more about PrOTect IT All:

    • Email: info@protectitall.co
    • Website: https://protectitall.co/
    • X:
    Afficher plus Afficher moins
    59 min