Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading

1
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust in…
…
continue reading

1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading

1
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
…
continue reading

1
The Security Sandbox | Modernizing Cyber Risk Management in OT
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
…
continue reading

1
The Security Sandbox | Evolving Endpoint Security in OT
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
…
continue reading

1
ePlus Security Hype Free Zone - Episode 1: Artificial Intelligence
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45Listen to Lee Waskevich, VP, of Security Strategy at ePlus, dive into the topic of AI on the latest episode of our podcast series: ePlus Security Hype Free Zone. Hosted by Shawn Eftink, Director of Managed Security Services Strategy, this episode provides insight into the evolution and benefits of Artificial Intelligence, along with the pros and co…
…
continue reading

1
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
…
continue reading

1
ePlus Security Presents: Security with Soccer Mom - Ep. 1 Managed Detection and Response
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16In Episode 1, ePlus’ Director of Managed Security Services and host of Security with Soccer Mom, alongside ePlus Director of Security Services Alisa Castro dive into the elements of Managed Detection and Response and the importance of including a Threat Detection & Response Guidance service to fill gaps and cover your bases.…
…
continue reading

1
Cybersecurity Collaboration in City Government - Season 1, Episode 5
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41The most common attack vector these days with ransomware is people. It's all about phishing, clicking on bad links, stolen credentials, et cetera, et cetera. And the key to preventing that attack vector is, of course, training and awareness. And that takes collaboration, both internally and across organizations. Our focus today is on municipalities…
…
continue reading

1
IT Modernization Tip #3: Why Starting in Pre-Sales Was My Best Decision
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23As the first guest from a pre-sales background on IT Visionaries, hear Justin Mescher discuss how pre-sales was the best jumping point in his career due to his love for people and listening, and the overall keys for professional success in IT.
…
continue reading

1
IT Modernization Tip #2: Driving Innovation via Culture
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24ePlus encourages organizations to invest in their people- that doesn’t necessarily mean headcount, but rather ongoing education. Listen to Justin Mescher explain more about the best way to build teams that are built to scale at a fast pace.
…
continue reading

1
Executing Your Digital Modernization Strategies
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16ePlus Vice President of Cloud Solutions Justin Mescher spoke with IT Visionaries, hosted by Albert Chou, about how the ePlus team delivers the expertise and technology solutions customers need to execute their digital modernization strategies. Leading the overall strategy and go-to-market for both the Cloud and Data Center practices as part of ePlu…
…
continue reading
Hear Justin Mescher discuss the biggest trends in modern enterprise infrastructure, including how more organizations are adopting hybrid cloud strategies because they need the flexibility to deploy at the right place at the right time for the right workload.
…
continue reading

1
What is Incident Response? | Nozomi Networks
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incid…
…
continue reading

1
What is Threat Detection? | Nozomi Networks
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further. Learn more with Nozomi Networks Cybersecurity…
…
continue reading

1
What is Cyber Risk Management? | Nozomi Networks
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou. Visit Our Website Follow Us on Link…
…
continue reading

1
What is Zero Trust Security? I Nozomi Networks
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design appr…
…
continue reading

1
A Day in the Life of an OT Responder
1:01:55
1:01:55
Play later
Play later
Lists
Like
Liked
1:01:55Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, process, and respond to a situation. In this case, we look at what a typical day an Operational Technology (OT) responder must endure and why this role is crucial within critical infrastructure and in…
…
continue reading

1
Cyber and Operational Resilience for Smart Factories
1:00:32
1:00:32
Play later
Play later
Lists
Like
Liked
1:00:32Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge. Visit Our Website Follow Us on LinkedInBy Nozomi Networks
…
continue reading

1
OT Network Security Challenges in Enterprise Environments
1:02:40
1:02:40
Play later
Play later
Lists
Like
Liked
1:02:40Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation. Visit Our Website Follow Us on LinkedInBy Nozomi Networks
…
continue reading

1
Monitoring & Protecting Assets in Critical Infrastructure
1:03:05
1:03:05
Play later
Play later
Lists
Like
Liked
1:03:05Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your assets. Visit Our Website Follow Us on LinkedInBy Nozomi Networks
…
continue reading

1
READI Network Series: What is an intelligent network and what can it do?
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07How can organizations sustain network intelligence as technology evolves? Learn how leveraging an ePlus READI network architecture is a catalyst to achieving more.By ePlus Technology
…
continue reading

1
READI Network Series: Considerations for Building a Defensive Network
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13Building a network that’s secured and smart at the network layer can help prevent malicious activity. More than that – it can immediately monitor for, detect and remediate threats, misuse of data or information, unwanted modifications or anything else that goes against your security policy. Learn more.…
…
continue reading

1
READI Network Series: The Importance of an Agile Network
4:05
4:05
Play later
Play later
Lists
Like
Liked
4:05Particularly over the past couple of years, the need for network agility has never been more obvious. Organizations were faced with unprecedented challenges, and in many cases, their networks were either an enabler or a hinderance to their success. Learn more about the importance of building an agile network and how it impacts your organization.…
…
continue reading

1
READI Network Series: Making Your Network Efficient
2:16
2:16
Play later
Play later
Lists
Like
Liked
2:16What does an “efficient” network look like? What characteristics does it have? Learn how an efficient network can help you enable progress toward your business goals.By ePlus Technology
…
continue reading

1
READI Network Series: Building a Resilient Network
4:20
4:20
Play later
Play later
Lists
Like
Liked
4:20What does it mean to have a resilient network, and why does it matter? Learn some of the actions you can take to help make your network more resilient – or to ensure it stays that way.By ePlus Technology
…
continue reading

1
READI Network Series: Getting Your Network READI to Support Anything
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Organizations have increasingly started to realize that their network is the catalyst by which many of their other technology needs and applications either succeed or fail. Learn about how the ePlus READI methodology can help you achieve more.By ePlus Technology
…
continue reading
What is SD-WAN? What does it do and what benefits does it provide? This high level introduction to SD-WAN basics is a must listen for anyone just starting to explore this technology.By ePlus Technology
…
continue reading

1
In a World of Unsecure IoT - Is Privacy Dead?
1:02:04
1:02:04
Play later
Play later
Lists
Like
Liked
1:02:04Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a world, just how important is privacy, data security and protecting our IoT infrastructure? Learn about the complex issues of privacy and privilege in this episode. Visit Our Website Follow Us on Linke…
…
continue reading

1
Understanding the Risks to Operational Technology (OT)
1:00:26
1:00:26
Play later
Play later
Lists
Like
Liked
1:00:26Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk pl…
…
continue reading

1
Cybersecurity in Manufacturing - Season 1, Episode 4
30:22
30:22
Play later
Play later
Lists
Like
Liked
30:22How do you build out a sophisticated, enterprise-level cybersecurity posture when your mid-sized organization doesn’t even have a dedicated cybersecurity team, and even your vendors treat you like a small business? Turns out, the answer is pretty old school. It’s all about building the right relationships and setting the right priorities. Today we’…
…
continue reading

1
Defending Smart Cities from Cyber Threats
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. Visit Our Website Follow Us on LinkedInBy Nozomi Networks
…
continue reading

1
Cybersecurity in Financial Services with Farmers and Merchants Bank - Season 1, Episode 3
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13For obvious reasons, financial institutions have always been a top target for cyberattacks, and almost one half of all cyberattacks target small and medium-sized businesses. So, it stands to reason that if you’re going to be in charge of security for a regional bank, you’ve really got to know your stuff. Today we’re chatting with Tyler Morgan, Chie…
…
continue reading

1
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. Visit Our Website Follow Us on LinkedIn…
…
continue reading

1
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
1:01:05
1:01:05
Play later
Play later
Lists
Like
Liked
1:01:05U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of le…
…
continue reading

1
Cybersecurity in Local Government - Season 1, Episode 2
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58Municipalities, including local, city, county, and state government have unique challenges when it comes to cybersecurity. Often reliant upon IT generalists to perform the security heavy lifting, municipalities rely on an abundance of tools, and people, to get the job done. We interviewed the IT directors of two city municipalities in Texas and lea…
…
continue reading

1
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and…
…
continue reading

1
Improving Transportation System Operational Visibility and Security
56:58
56:58
Play later
Play later
Lists
Like
Liked
56:58The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper…
…
continue reading

1
Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting critical infrastructure and industrial operations. Join us for a discussion on the current OT/IoT threat landscape, supply chain threats to OT and IoT environments, ransomware risks, and how to prote…
…
continue reading

1
Dissecting the Security Implications of the Australian Critical Infrastructure Act
59:03
59:03
Play later
Play later
Lists
Like
Liked
59:03What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act's impact upon the Australian industrial landscape. This episode explores the motivations be…
…
continue reading

1
Cybersecurity in Healthcare, with Firelands Regional Medical Center - Season 1, Episode 1
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44We’re starting a new podcast series devoted to providing practical advice to pros trying to tackle their day-to-day cybersecurity challenges in the real world. To get there, we’re interviewing a few of our partners and customers, representing organizations of all shapes and sizes, and getting to know all the tools, policies, and procedures they rel…
…
continue reading

1
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage cyber risks, minimize disruptions and ensure safety. Special guest Jim Guinn, Global Managing Director with Ac…
…
continue reading

1
Serious Workplace Accidents and Their Connection to Cybersecurity
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive leadership teams accountable, is raising the stakes for corporations, boards and senior executives. In this episode, learn about corporate cyber risk and workplace safety laws from experts in cyber espio…
…
continue reading

1
Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected and protected vehicles. General Motors’ 1977 Oldsmobile Toronado was the first production car to incorporate embedded software. Today, automotive manufacturing is one of the most widely automated indust…
…
continue reading

1
Ngoc Phan – Managing Business During Times of Turmoil
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing to address the uncertainty and volatility, and how he’s helped the company pull together to launch a new SaaS solution (Vantage), and find new ways to support customers, employees, and partners. To lea…
…
continue reading
To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been a…
…
continue reading

1
Stephen Driggers – How the Customer Experience Leads to a Better OT Security Solution
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Learn why Stephen, Nozomi Networks’ Chief Revenue Officer, believes in creating an amazing customer experience at every touch point. He shares how listening closely to customer feedback and responding quickly to their requests leads to a much better OT/IoT security solution. To learn more about Stephen, visit: https://www.nozominetworks.com/company…
…
continue reading

1
Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
43:37
43:37
Play later
Play later
Lists
Like
Liked
43:37In this episode, learn how digital transformation has been fuelled by a global pandemic that forced many of us to work from home. Security visionaries from Schneider Electric and Nozomi Networks discuss the latest trends in industrial cybersecurity that have developed from the need for secure remote access, and cover a use case for an innovative se…
…
continue reading

1
Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?
36:05
36:05
Play later
Play later
Lists
Like
Liked
36:05As you move some or all of your data and applications from on-prem to the cloud, you may need to rethink your security strategy. This episode covers cloud options – private, public, and SaaS – to help you determine which is the right one for you. Panelists also discuss the risks of failing to ensure that your security infrastructure is ready before…
…
continue reading

1
Edgard Capdevielle – From Startup to Industry Leader
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Hear from Nozomi Networks’ President and CEO Edgard Capdevielle how the company transformed from a startup of seven people in the U.S. and Switzerland into a global OT and IoT security leader in less than seven years. To learn more about Edgard and Nozomi Networks' path to success, visit: https://www.nozominetworks.com/company/leadership Visit Our …
…
continue reading