top of page
![](https://static.wixstatic.com/media/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png/v1/fill/w_1440,h_700,al_c,q_90,enc_avif,quality_auto/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png)
![Podcast banner.png](https://static.wixstatic.com/media/6d64a8_005db8f2267649a0995f6ac3883554df~mv2.png/v1/fill/w_980,h_406,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/6d64a8_005db8f2267649a0995f6ac3883554df~mv2.png)
![Podcast.png](https://static.wixstatic.com/media/6d64a8_69c5d4a53a4d42fc855be7b6769ea74c~mv2.png/v1/fill/w_327,h_324,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Podcast.png)
![305493558_10162237341752942_2836354873734471506_n.jpg](https://static.wixstatic.com/media/6d64a8_bb6a0609876d4366bc95c6a3d29836e0~mv2.jpg/v1/crop/x_114,y_0,w_1254,h_1256/fill/w_152,h_152,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/305493558_10162237341752942_2836354873734471506_n.jpg)
with host: Derek Harp
a podcast featuring control system cyber security leaders from around the world
Our Podcast Sponsors
![Industrial Security Podcast](https://static.wixstatic.com/media/6d64a8_7597e0483e1d41e6b8477aa456a286a9~mv2.png/v1/fill/w_888,h_536,al_c,q_90,enc_avif,quality_auto/6d64a8_7597e0483e1d41e6b8477aa456a286a9~mv2.png)
![](https://static.wixstatic.com/media/6d64a8_39ec5be4724541f784f2208e4adf215e~mv2.png/v1/fill/w_572,h_682,al_c,q_90,enc_avif,quality_auto/6d64a8_39ec5be4724541f784f2208e4adf215e~mv2.png)
![](https://static.wixstatic.com/media/6d64a8_d9d9b21c3e0643e6a21d81ec88acbbcb~mv2.png/v1/fill/w_566,h_683,al_c,q_90,enc_avif,quality_auto/6d64a8_d9d9b21c3e0643e6a21d81ec88acbbcb~mv2.png)
bottom of page
with host: Derek Harp
a podcast featuring control system cyber security leaders from around the world
Our Podcast Sponsors