• Episode 88 — Prepare for Incidents: Draft and Update IR Documentation That OT Can Use
    Feb 23 2026

    This episode teaches how to prepare for incidents by drafting and maintaining IR documentation that OT teams can actually use during real events, where time pressure and safety constraints punish vague plans. You’ll learn what documentation must exist before an incident, including role assignments, contact trees, escalation criteria, safe containment principles, evidence handling procedures, communications templates, and site-specific constraints like maintenance windows and vendor-only change authority. We discuss why OT IR documentation should be practical and localized, with clear language, explicit decision pathways, and references to validated diagrams and inventories, so responders are not forced to invent structure mid-incident. Updating is framed as a continuous improvement loop, using lessons learned from exercises, near misses, vendor changes, and architecture updates to keep documentation aligned with reality instead of letting it drift into irrelevance. The episode also reinforces exam-ready thinking by showing how “prepare” often means building checklists, approvals, and evidence packages that enable safe action, fast coordination, and defensible decisions when the next incident arrives. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    15 mins
  • Episode 87 — Execute Escalation and Notification: Internal, Government, and Regulator Expectations
    Feb 23 2026

    This episode explains escalation and notification as disciplined processes that protect safety, preserve credibility, and reduce legal and regulatory risk, because delayed or inconsistent notifications can create consequences that outlast the technical incident. You’ll learn how internal escalation should work across operations, engineering, safety, IT, security leadership, legal, and communications, with clear triggers that avoid both panic escalation and dangerous delays. We cover external notification considerations, including when government coordination may be appropriate, how sector expectations influence timelines, and how regulator expectations tend to focus on accuracy, timeliness, and evidence of control rather than perfect certainty in early hours. The episode emphasizes that notification content must be grounded in what is known, what is unknown, and what actions are being taken, so teams avoid speculative statements that damage trust or create liability. Troubleshooting considerations include handling conflicting reports, ensuring time synchronization and decision logging, and maintaining a single authoritative narrative while technical teams continue investigation and containment under safety constraints. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    17 mins
  • Episode 86 — Plan Mutual Aid and Retainers: ISACs, Peer Support, and IRR Readiness
    Feb 23 2026

    This episode teaches how to plan mutual aid and retainers so OT incident response readiness is real, not theoretical, especially when specialized expertise and vendor knowledge may be required quickly. You’ll learn how mutual aid works in practice through sector communities and peer support, and why relationships and pre-defined trust are often more valuable than scrambling for contacts during a crisis. ISAC participation is discussed as a practical channel for timely intelligence, peer lessons learned, and coordinated response support, with an emphasis on how to consume and act on shared information safely in OT environments. Retainers are covered as contractual readiness tools, including defining scope, response timelines, access requirements, evidence handling expectations, and how retained responders coordinate with operations and safety leadership rather than operating like an external IT incident team. IRR readiness is framed as having the right people, contracts, procedures, and approvals in place so help can be activated without delay, while still maintaining governance and safe operational behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    15 mins
  • Episode 85 — Coordinate IT and OT During Incidents: Nuances, Authority, and Safety Priorities
    Feb 23 2026

    This episode explains how to coordinate IT and OT during incidents without letting either side accidentally increase risk, a common scenario theme where the “wrong” answer is a technically reasonable IT action applied at the wrong time in OT. You’ll learn why authority and accountability must be explicit, including who can approve isolations, who can change firewall rules, who can touch controller logic, and who owns safety decisions when containment could affect process behavior. We cover the operational nuance that many OT symptoms have both cyber and non-cyber explanations, so coordination must include shared situational awareness, evidence exchange, and agreed investigative steps that do not disrupt deterministic control. Safety priorities are emphasized as the governing constraint, including the need to validate current process state, identify safe states, and coordinate any changes with operators who understand the physical process and its tolerances. You’ll also learn best practices for communication cadence, decision logs, and handoffs, so IT and OT can move quickly while still preserving evidence, maintaining uptime where possible, and preventing parallel “fixes” that conflict. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    15 mins
  • Episode 84 — Address Overarching OT Incident Considerations: Cyber, Physical, Crisis, and Facilities
    Feb 23 2026

    This episode teaches the overarching considerations that make OT incident response different, because OT incidents often blend cyber events with physical realities, crisis management demands, and facilities constraints that cannot be ignored. You’ll learn how to assess whether an event is purely cyber, cyber-enabled physical impact, or a physical issue creating cyber symptoms, and why that distinction changes who must be involved and what actions are safe. Crisis considerations are framed around continuity, safety messaging, leadership decision cadence, and the need to coordinate across operations, safety, legal, communications, and external partners without creating conflicting instructions in the field. Facilities considerations include physical access control, room and cabinet security, power and environmental dependencies, and how facility changes during response can either preserve stability or accidentally widen impact. You’ll practice exam-ready reasoning by identifying when to pause technical actions, validate process conditions, coordinate with safety authorities, and document decisions so response remains defensible under scrutiny. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    16 mins
  • Episode 83 — Describe OT Incident Management Frameworks: PICERL and ICS4ICS With Clear Roles
    Feb 23 2026

    This episode explains how OT incident management frameworks provide structured response discipline when safety and uptime are at stake, and why SecOT+ scenarios often reward the answer that follows a clear lifecycle with defined roles. You’ll learn PICERL as a practical flow that emphasizes preparation and iterative improvement, then connect it to what teams actually do in OT, such as validating process state before containment, coordinating changes through operations leadership, and preserving evidence without disrupting control. ICS4ICS is covered as a way to align response to industrial realities, including stakeholder coordination, control system constraints, and the need to integrate cyber response with physical and safety management practices. The episode emphasizes role clarity, teaching how to separate decision authority, technical execution, communications, and safety oversight so response actions do not conflict or create additional hazards. You’ll also learn how to apply frameworks during troubleshooting by recognizing which phase you are in, what “good” evidence looks like at that phase, and what the safest next step is when uncertainty is high. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    18 mins
  • Episode 82 — Apply a Collection Management Framework: What to Collect, How Often, and Why
    Feb 23 2026

    This episode teaches how to apply a collection management framework so OT security data collection is purposeful, sustainable, and aligned to operational constraints rather than being an endless hunt for “more logs.” You’ll learn how to define collection requirements by starting with decisions you need to support, such as detecting abnormal remote access, validating change control, confirming asset presence, and proving control operation for compliance. We discuss collection sources across OT and supporting IT systems, including jump hosts, authentication platforms, firewalls, engineering workstations, passive network sensors, physical access controls, and process-support systems like historians, while emphasizing that each source must be evaluated for safety impact and data reliability. Frequency is framed as a risk and practicality decision, balancing near-real-time needs for high-risk pathways against periodic validation for slower-moving controls like access reviews and baseline checks. You’ll also learn how to document collection plans with scope, retention, ownership, quality checks, and feedback loops so the program improves over time instead of accumulating unusable data. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    15 mins
  • Episode 81 — Map Assets to a CMDB: Attributes, Relationships, and Drift Control:
    Feb 23 2026

    This episode explains how to map OT assets into a CMDB in a way that supports security decisions without forcing IT-centric data models that ignore plant reality. You’ll learn which attributes belong in a CMDB record for OT, including stable identifiers, location context down to cabinets or lines, ownership, vendor support boundaries, criticality, and interface exposure, so the CMDB becomes useful for vulnerability response and incident scoping. We then focus on relationships, such as controller-to-I/O dependencies, HMI-to-controller communications, historian data paths, remote access pathways, and shared services like identity and time synchronization, because many OT failures cascade through relationships, not individual devices. Drift control is treated as the key success factor, covering change triggers, validation cycles, and reconciliation practices that detect “silent” changes introduced by maintenance, contractors, or upgrades. You’ll also learn how to use CMDB outputs during troubleshooting and incidents, such as quickly identifying affected zones, confirming support ownership, and producing defensible evidence for audits and post-incident reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    18 mins