The OT and IoT Security Podcast
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
Episodes
47 episodes
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what as...
•
32:31
The Security Sandbox | Modernizing Cyber Risk Management in OT
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber ris...
•
Episode 3
•
31:42
The Security Sandbox | Evolving Endpoint Security in OT
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the pas...
•
31:23
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini a...
•
32:14
What is Incident Response? | Nozomi Networks
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensurin...
•
42:56
What is Threat Detection? | Nozomi Networks
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats...
•
37:26
What is Cyber Risk Management? | Nozomi Networks
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps.Learn more with Nozomi Networks Cybersecuri...
•
37:10
What is Zero Trust Security? I Nozomi Networks
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications a...
•
22:53
A Day in the Life of an OT Responder
Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, process, and respond to a situation. In this case, we look at what a typical day an Operationa...
•
1:01:55
Cyber and Operational Resilience for Smart Factories
Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge.
•
1:00:32
OT Network Security Challenges in Enterprise Environments
Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation.
•
1:02:40
Monitoring & Protecting Assets in Critical Infrastructure
Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your assets.
•
1:03:05
In a World of Unsecure IoT - Is Privacy Dead?
Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a world, just how important is privacy, data security and protecting our IoT infrastructure?&nbs...
•
1:02:04
Understanding the Risks to Operational Technology (OT)
Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infr...
•
Season 2
•
Episode 8
•
1:00:26
Defending Smart Cities from Cyber Threats
Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on.
•
Season 2
•
Episode 7
•
1:00:59
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wro...
•
Season 2
•
Episode 6
•
18:38
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country.&nbs...
•
Season 2
•
Episode 5
•
1:01:05
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within...
•
Season 2
•
Episode 4
•
5:58
Improving Transportation System Operational Visibility and Security
The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about...
•
Season 2
•
Episode 3
•
56:58
Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting critical infrastructure and industrial operations. Join us for a discussion on the current OT...
•
Season 2
•
Episode 2
•
54:36
Dissecting the Security Implications of the Australian Critical Infrastructure Act
What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betan...
•
Season 2
•
Episode 1
•
59:03
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity
Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage ...
•
Season 1
•
Episode 26
•
50:01
Serious Workplace Accidents and Their Connection to Cybersecurity
An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive leadership teams accountable, is raising the stakes for corporations, boards and senior executive...
•
Season 1
•
Episode 25
•
59:42
Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars
Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected and protected vehicles. General Motors’ 1977 Oldsmobile Toronado was the first production car to...
•
Season 1
•
Episode 24
•
26:02
Ngoc Phan – Managing Business During Times of Turmoil
Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing to address the uncertainty and volatility, and how he’s helped the company pull together to lau...
•
Season 1
•
Episode 23
•
15:42