
What Every Industrial CISO Needs to Know About Embedded Risk
- S1E6
- 30:52
- May 15th 2025
In this episode of Exploited: The Cyber Truth, RunSafe Security Founder and CEO Joe Saunders joins host Paul Ducklin to uncover one of the most overlooked threats in critical infrastructure: embedded risk.
As industrial systems become more automated and interconnected, embedded devices—once isolated—have become prime targets for attackers. Joe explains why embedded risk differs fundamentally from traditional IT threats, and why legacy systems, unmanaged endpoints, and obscure firmware pose some of the biggest risks to operational technology today.
We explore what makes embedded vulnerabilities so hard to find and fix, how real-time operating systems factor into security decisions, and why patching isn’t always an option in industrial settings. Joe also shares how Secure by Design, SBOMs, and exploit prevention strategies can help CISOs break free from the endless patch cycle and proactively reduce risk.
In this episode:
- What “embedded risk” really means for industrial environments
- Why legacy devices are so difficult—and dangerous—to secure
- How to rethink security when patching isn’t possible
- The real role of SBOMs in managing software supply chain risk
- Why real-time operating systems demand a different security mindset
- What every CISO should prioritize to protect safety and uptime
If you’re responsible for securing factory floors, OT networks, or embedded systems—this is a must-listen conversation.
Exploited: The Cyber Truth
Exploited: The Cyber Truth is a hard-hitting, no-fluff podcast exposing the realities of today’s cyber threat landscape and risks to critical infrastructure. Through candid conversations with top cybersecurity experts, industry leaders, and frontline defenders, the show breaks down recent high-profile vulnerabilities and exploits and covers innovative strategies used to stop them. To keep critical infrastructure safe, defenders need the upper hand. Tune in and get the cyber truth.