Nexus: A Claroty Podcast
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
Podcasting since 2020 • 122 episodes
Nexus: A Claroty Podcast
Latest Episodes
Adm. Michael Rogers on his time as NSA Director
Former NSA Director and Commander of U.S. Cyber Command Adm. Michael S. Rogers (Ret. USN) joins the Nexus Podcast. Rogers spoke in advance of an RSA Conference panel discussion today with the other living NSA directors, Keith Alexander, Paul Na...
•
Season 1
•
Episode 122
•
26:57
Michael Pyle on Securing Internet-Facing OT and ICS Assets
Michael Pyle, Director of Product Cybersecurity at Schneider Electric, joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to operational technology and industrial control systems...
•
Season 1
•
Episode 121
•
24:19
Gus Serino on a Massachusetts Water Cybersecurity Collaborative
Gus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence ...
•
Season 1
•
Episode 120
•
26:39
Dan Ricci on Four Years of the ICS Advisory Project
Industrial cybersecurity expert Dan Ricci, the founder and maintainer of the ICS Advisory Project, joins the Nexus Podcast to discuss the evolution of the industry's premier ICS and OT security ...
•
Season 1
•
Episode 119
•
28:58
Dan Gunter on Creating Malicious OT Test Data to Train Security Tools
Insane Cyber CEO and founder Dan Gunter joins the Nexus Podcast in an episode recorded live at the S4 Conference in Miami. Dan explains a process for generating malicous OT data in order to test the efficacy of an organization's intrusion detec...
•
Season 1
•
Episode 118
•
27:18