Risk Matters X.0

Risk Matters X.0

Risk Matters X.0 is a podcast focused on understanding how risk affects us today and into the next decade. Join us as we talk all things risk and why it matters to the people, businesses and industries that sustain our world.


October 27, 2022 9 min

88% of Boards of Directors view cybersecurity as a business risk— so why are budgets for industrial cybersecurity so scarce? Funding is often an issue because cybersecurity for Operational Technology (OT) environments is a relatively new idea brought on by the rapid IT-OT convergence. In this mini-episode, Ian Bramson, Global Head of Industrial Cybersecurity, and Rob Wade, Global Head of Sales and Strategy for Industrial Cybersecur...

Mark as Played

Do Information Technology (IT) and Operational Technology (OT) environments have anything in common? While some cybersecurity professionals may answer yes, the reality is that IT and OT are two separate worlds with vastly different priorities. In this mini-episode, Ian Bramson, Global Head of Industrial Cybersecurity, and Keon McEwen, Global Lead - Security Operations Center (SOC), discuss the IT-OT convergence and the resulting in...

Mark as Played

What does cybersecurity mean to your company? In this mini-episode, Global Head of Industrial Cybersecurity Ian Bramson and CEO Ryan Moody explore how different functions in industrial organizations perceive cyber risks.

From the board of directors to the team on the plant floor, the idea of OT cybersecurity and how to successfully implement it varies greatly. Regardless, hackers continue to exploit critical perception gaps to their...

Mark as Played
October 7, 2022 15 min

In this Cybersecurity Awareness Month mini-episode, Ian Bramson, Global Head of Industrial Cybersecurity, and Dennis Hackney, Solutions Development Director of Industrial Cybersecurity Services, discuss the specifics of what ransomware is and the difference between how it impacts IT environments and Operational Technology (OT) environments.

While ransomware in IT can hold your data hostage, ransomware in OT remains a whole different...

Mark as Played

When it comes to cyber targets, critical infrastructure remains in the line of fire. Furthermore, the attacks against them continue to develop in complexity with each strike, leaving operational technology (OT) and IT controls extremely vulnerable. This is especially true for the oil and gas space, which has been exposed to several organized crime syndicates in recent years. So, what’s next for your security infrastructure in comba...

Mark as Played

Cyber attackers know exactly what essential services can cripple us. Recent attacks on critical infrastructure have forced the power industry to take a step back and precariously assess its OT and IT controls. As the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards continue evolving to address today’s threats the heavy question remains: Is it enough?

Join host Ian Bramson, Glo...

Mark as Played

The cyber-physical world is now a raging battleground—who do you have on the digital frontline? As cyber attacks on industrial operations and critical infrastructures continue to rise, so do the devastating real-world impacts. Criminals are no longer simply stealing data; their goal is to disrupt and control core operations. This translates into what is now known as the cyber-physical world. From influencing the flow of oil and the...

Mark as Played

What does a career in STEM look like and how can we encourage more women to pursue this path?

There is currently a shortage of women in the fields of science, technology, engineering and mathematics (STEM). The solution: educating girls and young women on what a career in STEM truly looks like (it can be what you make of it) and exposing them to not only the vast realm of career choices, but how these jobs contribute to building and...

Mark as Played

If a cyber attack can take down an entire pipeline, what's next? As news from the recent attack on Colonial Pipeline continues to develop, owners and operators, the U.S. government and the public continue to question the dangerous implications behind our critical infrastructure lacking the proper cybersecurity against dangerous hackers. 

"20 years ago, if you wanted to attack operational technology (OT) or an industrial con...

Mark as Played

This episode is part three in a series of conversations with Wärtsilä’s cybersecurity and new technology leaders. 

Cyber incidents go from 0 to 100 in the blink of an eye. The recent cyber attack on Colonial Pipeline, one of the nation’s largest fuel pipelines, highlights this callous reality. With nearly half of the East Coast’s fuel supply disrupted, the conversation of protecting critical infrastructure is at the forefront of The...

Mark as Played
January 21, 2021 39 min

This episode is part two in a series of conversations with Wärtsilä’s cybersecurity and new technology leaders. 

A system is only as secure as its weakest point. In this episode of Risk Matters X.0, we discuss cyber ecosystems with Wärtsilä, examining the advantages and vulnerabilities that support connectivity. 

“The ecosystem in the marine environment is a very populated space,” says Eric Schreiber, General Manager for New Technolo...

Mark as Played
November 20, 2020 45 min

This episode is part one in a series of conversations with Wärtsilä’s cybersecurity and new technology leaders. 

Let’s talk digitalization and cyber risk. In this episode of Risk Matters X.0, we welcome Wärtsilä to discuss increasing connectivity as a major concern for cybersecurity in the digital age.

"As connectivity increases, so does cyber risk," – Ian Bramson, Head of Cybersecurity at ABS Group. 

"We are already livin...

Mark as Played

Episode 9: Cyber Risk Series – From the Hacker’s Point of View

What does cybersecurity look like from the opposition's point of view? With a long background in pen-testing (penetration testing) and extensive experience in security research and programming, Weston Hecker is a professional "white hat" hacker at Mission Secure, a firm focused on control system cybersecurity. An avid speaker on all things hacking, Weston is ...

Mark as Played
August 20, 2020 51 min

20 to 30 seconds. That's how long it takes cyber professional Ewan Robinson of Yangosat, a UK-based satellite communications supplier, to hack into your ship. "It's still very easy—the systems are still exposed. That's one of the things we're trying to bring to people, [the awareness of] just how exposed they are without knowing it," he says. "No system is an island," adds Ian Bramson, Global Head of...

Mark as Played

Let's talk Catastrophic Risk. How have major industrial incidents, transportation accidents, terrorist attacks and natural disasters changed our understanding of risk? A fire at the Port of Beirut, on Lebanon's northern Mediterranean coast, and subsequent ammonium nitrate explosion on 4 August 2020 has brought new public awareness as we investigate how this devastating incident occurred.

In this episode, Host Matt Mowrer see...

Mark as Played

Episode 6: Cyber Risk Series - Sleek showstoppers at sea, Superyachts are privately owned luxury vessels with the latest and most advanced technology systems onboard. As mix-use spaces, megayachts present a high return on investment for hackers seeking collateral damage with serious personal, safety and financial consequences. As the current COVID-19 situation continues to impact operations globally, how is the yachting market a pr...

Mark as Played

What is a business's responsibility for the general health and safety of its employees? Host Matt Mowrer, director of the Product Development and Innovation Center at ABS Group, talks with labor and employment partner Mike Correll from Reed Smith about COVID-19 business and legal issues.

As organizations return to work spaces, "there's going to be litigation about people who get sick, and there's going to be much mo...

Mark as Played

Episode 4: Cyber Risk Series - "The best loss is the loss that never occurs—whether that is a cyber incident or traditional marine peril-based loss like a grounding or collision. Premiums reflect loss experience, so with fewer losses you’re going to pay a lower premium." – John Miklus, President of American Institute of Marine Underwriters (AIMU).

Is cyber risk covered in your marine insurance plan? How does the insurance i...

Mark as Played

Episode 3: Cyber Risk Series - "In emergency management, does cyber security have a role? Absolutely. The real question is will you realize it soon enough before you have an emergency inside of your emergency." After responding to eight major Gulf Coast hurricanes together as facility security officers, Bryan Markland of Lucite International shares current cyber insights with intelligence professional and veteran Brian Shaj...

Mark as Played

Episode 2: Let’s talk Risk Perception as we confront COVID-19. Go behind-the-scenes in this episode to understand how risk professionals assess public safety threats using real-life data to debunk some of our common fears. Applying an objective lens is crucial in knowing how to manage risk in times of uncertainty. 

About the hosts:

“As we look at and discuss all things related to risk, this conversation focuses on how we perceive dif...

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

    Crime Junkie

    If you can never get enough true crime... Congratulations, you’ve found your people.

    The Piketon Massacre

    The most notorious mass murder in Ohio’s history happened on the night of April 21, 2016 in rural Pike County. Four crime scenes, thirty-two gunshot wounds, eight members of the Rhoden family left dead in their homes. Two years later a local family of four, the Wagners, are arrested and charged with the crimes. As the Wagners await four back-to-back capital murder trials, the KT Studios team revisits Pike County to examine: crime-scene forensics, upcoming legal proceedings, and the ties that bind the victims and the accused. As events unfold and new crimes are uncovered, what will it mean for all involved? What will it mean for Pike County?

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks then look no further. Josh and Chuck have you covered.


    It’s a lighthearted nightmare in here, weirdos! Morbid is a true crime, creepy history and all things spooky podcast hosted by an autopsy technician and a hairstylist. Join us for a heavy dose of research with a dash of comedy thrown in for flavor.

Advertise With Us

For You

    Music, radio and podcasts, all free. Listen online or download the iHeart App.


    © 2022 iHeartMedia, Inc.