Player FM - Internet Radio Done Right
20 subscribers
Checked 8M ago
Added five years ago
Content provided by Nozomi Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nozomi Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
N
Netflix Sports Club Podcast


1 America’s Sweethearts: Dallas Cowboys Cheerleaders Season 2 - Tryouts, Tears, & Texas 32:48
32:48
Play Later
Play Later
Lists
Like
Liked32:48
America’s Sweethearts: Dallas Cowboys Cheerleaders is back for its second season! Kay Adams welcomes the women who assemble the squad, Kelli Finglass and Judy Trammell, to the Netflix Sports Club Podcast. They discuss the emotional rollercoaster of putting together the Dallas Cowboys Cheerleaders. Judy and Kelli open up about what it means to embrace flaws in the pursuit of perfection, how they identify that winning combo of stamina and wow factor, and what it’s like to see Thunderstruck go viral. Plus, the duo shares their hopes for the future of DCC beyond the field. Netflix Sports Club Podcast Correspondent Dani Klupenger also stops by to discuss the NBA Finals, basketball’s biggest moments with Michael Jordan and LeBron, and Kevin Durant’s international dominance. Dani and Kay detail the rise of Coco Gauff’s greatness and the most exciting storylines heading into Wimbledon. We want to hear from you! Leave us a voice message at www.speakpipe.com/NetflixSportsClub Find more from the Netflix Sports Club Podcast @NetflixSports on YouTube, TikTok, Instagram, Facebook, and X. You can catch Kay Adams @heykayadams and Dani Klupenger @daniklup on IG and X. Be sure to follow Kelli Finglass and Judy Trammel @kellifinglass and @dcc_judy on IG. Hosted by Kay Adams, the Netflix Sports Club Podcast is an all-access deep dive into the Netflix Sports universe! Each episode, Adams will speak with athletes, coaches, and a rotating cycle of familiar sports correspondents to talk about a recently released Netflix Sports series. The podcast will feature hot takes, deep analysis, games, and intimate conversations. Be sure to watch, listen, and subscribe to the Netflix Sports Club Podcast on YouTube, Spotify, Tudum, or wherever you get your podcasts. New episodes on Fridays every other week.…
Cyber and Operational Resilience for Smart Factories
Manage episode 328930096 series 2792612
Content provided by Nozomi Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nozomi Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Manage episode 328930096 series 2792612
Content provided by Nozomi Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nozomi Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
All episodes
×T
The OT and IoT Security Podcast

1 The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future 29:44
29:44
Play Later
Play Later
Lists
Like
Liked29:44
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust initiatives are changing industrial network architecture ▶️ The growing role of Secure by Design principles ▶️ Upcoming regulations driving cybersecurity enhancements across industries ▶️ Why proactive defense in OT environments will be a key initiative in 2025 Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Security Sandbox at the ICS Cybersecurity Conference 19:44
19:44
Play Later
Play Later
Lists
Like
Liked19:44
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence 32:31
32:31
Play Later
Play Later
Lists
Like
Liked32:31
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems. In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments. You'll learn about: Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surface Using asset context when acting on threat intelligence in OT systems Real-world examples of successful proactive threat response Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Security Sandbox | Modernizing Cyber Risk Management in OT 31:42
31:42
Play Later
Play Later
Lists
Like
Liked31:42
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply the latest tools, trends and techniques to reduce cyber risk and enhance the resilience of your OT systems. We’ll cover: Different risk scoring approaches, like quantitative, qualitative, and hybrid models, which help organizations prioritize and address vulnerabilities. Emerging trends in cyber risk management, including the growing adoption of AI-driven analytics, automation, and integrated security frameworks. How technologies like artificial intelligence and advanced threat detection systems are reshaping how organizations mitigate risk in OT environments. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Security Sandbox | Evolving Endpoint Security in OT 31:23
31:23
Play Later
Play Later
Lists
Like
Liked31:23
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and even operational data from level 0 in a PLC. During this session, we'll delve into the advancements in OT-safe proactive monitoring and how you could apply some of these latest developments towards securing your critical infrastructure while ensuring operational continuity and compliance. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud 32:14
32:14
Play Later
Play Later
Lists
Like
Liked32:14
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is on to outsmart bad actors who are already using new forms of AI to find vulnerabilities faster and launch more effective attacks. During this session, we'll delve into what AI really is, its applications for cybersecurity, and how critical infrastructure and industrial organizations are using it to stay ahead of cyber threats. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 What is Incident Response? | Nozomi Networks 42:56
42:56
Play Later
Play Later
Lists
Like
Liked42:56
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incident does occur. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and OT Cybersecurity Strategist Danielle Jablanski. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 What is Threat Detection? | Nozomi Networks 37:26
37:26
Play Later
Play Later
Lists
Like
Liked37:26
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Security Research Evangelist Roya Gordon. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 What is Zero Trust Security? I Nozomi Networks 22:53
22:53
Play Later
Play Later
Lists
Like
Liked22:53
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design approach. Learn more from Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Gary Kinghorn, Senior Director of Product Marketing. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 What is Cyber Risk Management? | Nozomi Networks 37:10
37:10
Play Later
Play Later
Lists
Like
Liked37:10
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, process, and respond to a situation. In this case, we look at what a typical day an Operational Technology (OT) responder must endure and why this role is crucial within critical infrastructure and industrial control networks. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Cyber and Operational Resilience for Smart Factories 1:00:32
1:00:32
Play Later
Play Later
Lists
Like
Liked1:00:32
Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge. Visit Our Website Follow Us on LinkedIn
T
The OT and IoT Security Podcast

1 OT Network Security Challenges in Enterprise Environments 1:02:40
1:02:40
Play Later
Play Later
Lists
Like
Liked1:02:40
Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation. Visit Our Website Follow Us on LinkedIn
T
The OT and IoT Security Podcast

1 Monitoring & Protecting Assets in Critical Infrastructure 1:03:05
1:03:05
Play Later
Play Later
Lists
Like
Liked1:03:05
Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your assets. Visit Our Website Follow Us on LinkedIn
T
The OT and IoT Security Podcast

1 In a World of Unsecure IoT - Is Privacy Dead? 1:02:04
1:02:04
Play Later
Play Later
Lists
Like
Liked1:02:04
Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a world, just how important is privacy, data security and protecting our IoT infrastructure? Learn about the complex issues of privacy and privilege in this episode. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Understanding the Risks to Operational Technology (OT) 1:00:26
1:00:26
Play Later
Play Later
Lists
Like
Liked1:00:26
Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk plan to prevent future cyberattacks. The incoming Critical Infrastructure Bill is aimed at driving action in this direction and organizations must start to prepare now to secure their IT as well their OT / IoT infrastructure. These combined capabilities not only achieve significant improvements in cybersecurity but bring remarkable improvements in the efficiency of managing and securing your diverse assets. In this episode, learn more about: Threats to OT Unified visibility and security Eliminating OT and IT silos Reducing risks to OT, IT and IoT Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Defending Smart Cities from Cyber Threats 1:00:59
1:00:59
Play Later
Play Later
Lists
Like
Liked1:00:59
Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. Visit Our Website Follow Us on LinkedIn
T
The OT and IoT Security Podcast

1 Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community 18:38
18:38
Play Later
Play Later
Lists
Like
Liked18:38
PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program 1:01:05
1:01:05
Play Later
Play Later
Lists
Like
Liked1:01:05
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now? Join with us as we explore: The steps involved in building out a Risk & Compliance Program Effective design, implementation and response components Building a quality ecosystem that supports identifying, managing and mitigating risks Gathering intelligence for making evidence-based decisions Ensuring your time and effort leads to a quality outcome Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The Verkada IoT Security Camera Attack – How Did Hackers Get In? 5:58
5:58
Play Later
Play Later
Lists
Like
Liked5:58
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Improving Transportation System Operational Visibility and Security 56:58
56:58
Play Later
Play Later
Lists
Like
Liked56:58
The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper operational visibility, prevent downtime and detect cyber threats. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Insights on the Top OT/IoT Security Threats – How to Protect Your Operations 54:36
54:36
Play Later
Play Later
Lists
Like
Liked54:36
To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting critical infrastructure and industrial operations. Join us for a discussion on the current OT/IoT threat landscape, supply chain threats to OT and IoT environments, ransomware risks, and how to protect your critical OT/IoT networks. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Dissecting the Security Implications of the Australian Critical Infrastructure Act 59:03
59:03
Play Later
Play Later
Lists
Like
Liked59:03
What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act's impact upon the Australian industrial landscape. This episode explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity 50:01
50:01
Play Later
Play Later
Lists
Like
Liked50:01
Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage cyber risks, minimize disruptions and ensure safety. Special guest Jim Guinn, Global Managing Director with Accenture Security, joins the discussion to share his experiences that span time on the rig to board-level cybersecurity planning. Here are links to the security resources mentioned during the session: Accenture Security: ICS Cyber Range Whitepaper: Midstream Oil and Gas Industry - Improving ICS Visibility Boosts Operations and Cyber Security Webpage: Securing OT & IoT in Oil & Gas Case Study: Oil & Gas Producer Deploys Global ICS Security Program Case Study: National Gas Distributor Achieves Pipeline Visibility Executive Brief: The Cost of OT Cybersecurity Incidents and How to Reduce Risk Webpage: Preventing Unplanned Downtime Due to Equipment Failure Blog: Massive IoT Disruption Coming to an OT Network Near You Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Serious Workplace Accidents and Their Connection to Cybersecurity 59:42
59:42
Play Later
Play Later
Lists
Like
Liked59:42
An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive leadership teams accountable, is raising the stakes for corporations, boards and senior executives. In this episode, learn about corporate cyber risk and workplace safety laws from experts in cyber espionage and workplace and risk management. Find out what you can do to strengthen your security posture. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars 26:02
26:02
Play Later
Play Later
Lists
Like
Liked26:02
Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected and protected vehicles. General Motors’ 1977 Oldsmobile Toronado was the first production car to incorporate embedded software. Today, automotive manufacturing is one of the most widely automated industries in the world. Learn more about how smart devices are used for everything from in-vehicle diagnostics to autonomous control. To learn more about Rich and his role as a Nozomi Networks advisor, visit: https://www.nozominetworks.com/company/leadership/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Ngoc Phan – Managing Business During Times of Turmoil 15:42
15:42
Play Later
Play Later
Lists
Like
Liked15:42
Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing to address the uncertainty and volatility, and how he’s helped the company pull together to launch a new SaaS solution (Vantage), and find new ways to support customers, employees, and partners. To learn more about Ngoc, visit: https://www.nozominetworks.com/company/leadership/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been affected. Listen to the podcast learn what can be done. Here are links to the security resources mentioned during the session: Blog: Overcoming the Challenges of Detecting P2P Botnets on Your Network Webpage: Nozomi Networks Labs (Threat Advisories, Community Tools and more) Research Report: OT/IoT Security Report 2020 1H Blog: Your Guide to the MITRE ATT&CK Framework for ICS Webinar: How to Use the MITRE ATT&CK Framework for ICS Data Sheet: Threat Intelligence – Detect Emerging OT and IoT Threats and Vulnerabilities Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Stephen Driggers – How the Customer Experience Leads to a Better OT Security Solution 13:48
13:48
Play Later
Play Later
Lists
Like
Liked13:48
Learn why Stephen, Nozomi Networks’ Chief Revenue Officer, believes in creating an amazing customer experience at every touch point. He shares how listening closely to customer feedback and responding quickly to their requests leads to a much better OT/IoT security solution. To learn more about Stephen, visit: https://www.nozominetworks.com/company/leadership/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity 43:37
43:37
Play Later
Play Later
Lists
Like
Liked43:37
In this episode, learn how digital transformation has been fuelled by a global pandemic that forced many of us to work from home. Security visionaries from Schneider Electric and Nozomi Networks discuss the latest trends in industrial cybersecurity that have developed from the need for secure remote access, and cover a use case for an innovative security solution. Here are links to the security resources mentioned during the session: Marketplace: Schneider Electric Exchange Press Release: Nozomi Networks Delivers OT & IoT Cybersecurity Via the Schneider Electric Exchange Webpage: Nozomi Networks Guardian - Solution for EcoStruxure™ CyberSecurity Services Solution Brief: Nozomi Networks Guardian – The Leading Solution for OT and IoT Security Data Sheet: Guardian – Industrial Strength OT and IoT Security and Visibility Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready? 36:05
36:05
Play Later
Play Later
Lists
Like
Liked36:05
As you move some or all of your data and applications from on-prem to the cloud, you may need to rethink your security strategy. This episode covers cloud options – private, public, and SaaS – to help you determine which is the right one for you. Panelists also discuss the risks of failing to ensure that your security infrastructure is ready before migrating. Here are links to the security resources mentioned during the session: Webpage: Closing the IoT Security Gap Research Report: OT/IoT Security Report 2020 1H Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports Data Sheet: Guardian – Industrial Strength OT and IoT Security and Visibility Data Sheet: Threat Intelligence – Detect Emerging OT and IoT Threats and Vulnerabilities Data Sheet: Asset Intelligence – Focus on the OT and IoT Incidents That Matter Microsoft Azure Marketplace: Nozomi Networks Guardian , Central Management Console Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Edgard Capdevielle – From Startup to Industry Leader 18:30
18:30
Play Later
Play Later
Lists
Like
Liked18:30
Hear from Nozomi Networks’ President and CEO Edgard Capdevielle how the company transformed from a startup of seven people in the U.S. and Switzerland into a global OT and IoT security leader in less than seven years. To learn more about Edgard and Nozomi Networks' path to success, visit: https://www.nozominetworks.com/company/leadership Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Moreno Carullo – Using Artificial Intelligence and Machine Learning in Cybersecurity 19:15
19:15
Play Later
Play Later
Lists
Like
Liked19:15
Learn why Moreno Carullo launched Nozomi Networks with university-mate Andrea Carcano in 2013, and how artificial intelligence and machine learning are being used to drive OT security automation and increase the effectiveness of small cybersecurity teams. Moreno also discusses how Nozomi Networks uses these two technologies to provide up-to-date threat and asset intelligence. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Cyber Crime Migration to Critical Infrastructure 58:48
58:48
Play Later
Play Later
Lists
Like
Liked58:48
In this episode, find out what every critical infrastructure and industrial operation should know to keep operations safe. Learn about cyber espionage, and how the lines are blurring between organized cybercrime and nation-sponsored efforts. Nozomi Networks’ Phillip Page is joined by Chinese Cyber Espionage Expert Retired Lt Colonel Bill Hagestad II, and former Federal Prosecutor US Department of Justice Jonathan Rusch, with the episode facilitated by Brian Hay, former Operational Commander of Fraud and Cybercrime for the Queensland Police. Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS. Here are links to the security resources mentioned during the session: Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IOT Threat Response Blog: Your Guide to the MITRE ATT&CK Framework for ICS Research Report: OT/IoT Security Report 2020 1H Blog: NSA and CISA Call for Action to Lower OT/IoT Cybersecurity Exposure Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution 35:34
35:34
Play Later
Play Later
Lists
Like
Liked35:34
Learn about the pitfalls typically encountered when choosing an OT/IoT cybersecurity solution. From evaluation to selection, purchase, and deployment, this podcast covers the most important questions to ask the vendors you’re considering, and ways to successfully navigate past the key hazards. Join Nozomi Networks host Chris Grove and CMO Kim Legelis as they address this important process. Here are links to the free resources mentioned during the webinar: Solution Brief: Real-time Cybersecurity and Visibility for Industrial Control Networks Learning Guide: The IT Pro’s Guide to OT/IoT Security Executive Brief: Integrating OT into IT/OT SOCs Executive Brief: The Cost of OT Cybersecurity Incidents and How to Reduce Risk Research Report: OT/IoT Security Report 2020 1H Webpage: Customer Reviews – Gartner Peer Insights on OT Security Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Alessandro Di Pinto – A Day in the Life of a Threat Analyst 32:12
32:12
Play Later
Play Later
Lists
Like
Liked32:12
Learn about Alessandro’s path from pen tester to threat analyst, and what a threat analyst does day-to-day. Find out more about the activities that Alessandro and his security research team are involved in: looking for new threats reported by the security community, gathering samples, analyzing their behavior and creating efficient signatures to precisely detect threats and help industrial and other OT/IoT organizations keep their networks secure. To find out more about Nozomi Networks Labs, visit: https://www.nozominetworks.com/labs/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Alan Berusch - The Role of Culture in Company Success 16:30
16:30
Play Later
Play Later
Lists
Like
Liked16:30
This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain insight into their tactics, techniques and procedures, as well as recommendations for securing your OT/IoT networks. You’ll also learn about the top ICS vulnerabilities of 2020, and their ongoing impact on risk from Nozomi Networks security researchers. Here are links to the free resources and security tools mentioned during the webinar: · Research Report: OT/IoT Security Report 2020 1H · Blog: What IT Needs to Know about OT/IoT Security Threats in 2020 · Learning Guide: The IT Pro’s Guide to OT/IoT Security · Executive Brief: Integrating OT into IT/OT SOCs · Executive Brief: The Cost of OT Cybersecurity Incidents and How to Reduce Risk · Solution Brief: Real-time Cybersecurity and Visibility for Industrial Control Networks Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain insight into their tactics, techniques and procedures, as well as recommendations for securing your OT/IoT networks. You’ll also learn about the top ICS vulnerabilities of 2020, and their ongoing impact on risk from Nozomi Networks security researchers. Here are links to the free resources and security tools mentioned during the webinar: Research Report: OT/IoT Security Report 2020 1H Blog: What IT Needs to Know about OT/IoT Security Threats in 2020 Learning Guide: The IT Pro’s Guide to OT/IoT Security Executive Brief: Integrating OT into IT/OT SOCs Executive Brief: The Cost of OT Cybersecurity Incidents and How to Reduce Risk Solution Brief: Real-time Cybersecurity and Visibility for Industrial Control Networks Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Chet Namboodri – The Power of Partnerships: Taking OT Cybersecurity to the Next Level 22:47
22:47
Play Later
Play Later
Lists
Like
Liked22:47
As Nozomi Networks VP of Worldwide Business Development and Channel Sales, Chet Namboodri knows the value of partnerships. Learn how partnering between security providers creates better solutions, and what type of partners Nozomi Networks looks for. Also, find out what changes Chet sees in the future, as the partnership landscape evolves to address emerging threats. To learn more about Chet, visit: https://www.nozominetworks.com/company/leadership/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Kim Legelis – What’s Being Done to Protect Us from the Bad Guys 15:25
15:25
Play Later
Play Later
Lists
Like
Liked15:25
Find out what led Nozomi Networks CMO Kim Legelis to cybersecurity, and who the bad guys are in the current OT/IoT security landscape. Learn what security experts are doing to protect us from cyberattacks on critical infrastructure. Kim also shares her thoughts on how the discussion has shifted from explaining the need for cybersecurity to focusing on what’s being done to address cyber threats . To learn more about Kim, visit: https://www.nozominetworks.com/company/leadership/ Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

How should Security Operations Center (SOC) analysts face the often-overwhelming number of alerts triggered by ICS and IoT systems? Find out why alerts can be a problem, and how you can avoid common SOC monitoring pitfalls. Nozomi Networks CPO & Co-founder Andrea Carcano and host Chris Grove also cover how automated OT/IoT monitoring and anomaly detection solutions can be used to increase SOC efficiency while enhancing responsiveness. Here are links to the free resources and security tools mentioned during the webinar: Executive Brief: Integrating OT into IT/OT SOCs Blog: Making the Case for an IT/OT Security Operations Center (SOC) On-demand Webinar: Trends in OT Cybersecurity: IT/OT Convergence is here to stay White Paper: Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution Solution Brief: OT and IoT Security and Visibility Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Smart Grids: Securing Encrypted Communications 1:01:53
1:01:53
Play Later
Play Later
Lists
Like
Liked1:01:53
In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of encrypted OT/IoT systems. Nozomi Networks security researchers combine research with field expertise to drill into what is being done, using IEC 62351 as an example. They also cover two different attack scenarios, and the future of the threat detection landscape. White Paper: Improving ICS Cybersecurity for Substations and Power Grids Webpage: Securing OT and IoT in Electric Utilities Case Study: Trustpower: Securing New Zealand’s Power and Telecoms Network Webpage: COVID-19 Cybersecurity: Community Support Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 The IoT Botnet Threat: What It Is and How to Deal with It 43:02
43:02
Play Later
Play Later
Lists
Like
Liked43:02
Learn about IoT botnet threats from Nozomi Networks security researchers, including common propagation techniques, hacktivism, and strategies to protect your own networks. This episode discusses Dark Nexus, an IoT botnet that uses DDoS attacks for financial gain, and which has been active over the last few months. The related webinar shows a real-time execution demo of Dark Nexus. Here are links to the free resources and security tools mentioned during the webinar: On-demand Webinar: The IoT Botnet Threat: What It Is and How to Deal with It Blog: Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity Webpage: COVID-19 Malware: Community Support GitHub: COVID-19-Themed Network Indicator Blog: COVID-19 Malware: New OT and IoT Security Tools Visit Our Website Follow Us on LinkedIn…
T
The OT and IoT Security Podcast

1 Viruses Are Disrupting Our Supply Chains - Where Do The Biggest Vulnerabilities Lie? 35:52
35:52
Play Later
Play Later
Lists
Like
Liked35:52
COVID-19 has disrupted supply chains across the world. But disruptions to the manufacturing supply chain are surprisingly common, due to equipment failure, component unavailability, or nation-state sponsored cyberattacks. Learn how manufacturers and supply chain members can protect themselves, with panelist Armando Seay, Director of DreamPort. Here are links to the free resources and security tools mentioned during the webinar: Website: DreamPort Website: Maryland Innovation & Security Institute (MISI) Industry Brief: Manufacturing: Improving Operational Resiliency Through ICS Visibility and Cyber Security Webpage: Nozomi Networks Labs: COVID-19 Security Community Support Blog: Government Helps Its Supply Chain Build OT and IoT Cybersecurity Visit Our Website Follow Us on LinkedIn…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.