The OT and IoT Security Podcast

The OT and IoT Security Podcast

Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.

Episodes

October 9, 2021 60 min

 Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk plan to prevent future cyberattacks.  The incoming Critical Infrastructure Bill is aim...

Share
Mark as Played

Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. 

Share
Mark as Played

PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment.  Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. 

Share
Mark as Played

U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. 

Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare fo...

Share
Mark as Played

IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.

 

Share
Mark as Played

The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper operational visibility, prevent downtime and detect cyber threats. 

Share
Mark as Played

To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting critical infrastructure and industrial operations. Join us for a discussion on the current OT/IoT threat landscape, supply chain threats to OT and IoT environments, ransomware risks, and how to protect your critical OT/IoT networks.

Share
Mark as Played

What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? 

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act's impact upon the Australian industrial landscape. This episode explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward c...

Share
Mark as Played

Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage cyber risks, minimize disruptions and ensure safety. Special guest Jim Guinn, Global Managing Director with Accenture Security, joins the discussion to share his experiences that span time on...

Share
Mark as Played

An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive leadership teams accountable, is raising the stakes for corporations, boards and senior executives. In this episode, learn about corporate cyber risk and workplace safety laws from experts in cyber espionage and workplace and risk management. Find out what you can do to strengthen your s...

Share
Mark as Played

Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected and protected vehicles. General Motors’ 1977 Oldsmobile Toronado was the first production car to incorporate embedded software. Today, automotive manufacturing is one of the most widely automated industries in the world. Learn more about how smart devices are used for everything from in...

Share
Mark as Played

Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing to address the uncertainty and volatility, and how he’s helped the company pull together to launch a new SaaS solution (Vantage), and find new ways to support customers, employees, and partners.

To learn more about Ngoc, visit: https://www.nozominetworks.com/company/leadership/

Share
Mark as Played
November 4, 2020 34 min

To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been affected. Listen to the podcast learn what can be done.
 
Here are links to the security...

Share
Mark as Played

Learn why Stephen, Nozomi Networks’ Chief Revenue Officer, believes in creating an amazing customer experience at every touch point. He shares how listening closely to customer feedback and responding quickly to their requests leads to a much better OT/IoT security solution. 

To learn more about Stephen, visit: https://www.nozominetworks.com/company/leadership/

Share
Mark as Played

In this episode, learn how digital transformation has been fuelled by a global pandemic that forced many of us to work from home. Security visionaries from Schneider Electric and Nozomi Networks discuss the latest trends in industrial cybersecurity that have developed from the need for secure remote access, and cover a use case for an innovative security solution.

Here are links to the security resources mentioned during the sessio...

Share
Mark as Played

As you move some or all of your data and applications from on-prem to the cloud, you may need to rethink your security strategy. This episode covers cloud options – private, public, and SaaS – to help you determine which is the right one for you. Panelists also discuss the risks of failing to ensure that your security infrastructure is ready before migrating. 

Here are links to the security resources mentioned during the session: 

  • We...
  • Share
    Mark as Played

    Hear from Nozomi Networks’ President and CEO Edgard Capdevielle how the company transformed from a startup of seven people in the U.S. and Switzerland into a global OT and IoT security leader in less than seven years.  

    To learn more about Edgard and Nozomi Networks' path to success, visit: https://www.nozominetworks.com/company/leadership

    Share
    Mark as Played

    Learn why Moreno Carullo launched Nozomi Networks with university-mate Andrea Carcano in 2013, and how artificial intelligence and machine learning are being used to drive OT security automation and increase the effectiveness of small cybersecurity teams. Moreno also discusses how Nozomi Networks uses these two technologies to provide up-to-date threat and asset intelligence. 

    Share
    Mark as Played

    In this episode, find out what every critical infrastructure and industrial operation should know to keep operations safe. Learn about cyber espionage, and how the lines are blurring between organized cybercrime and nation-sponsored efforts. Nozomi Networks’ Phillip Page is joined by Chinese Cyber Espionage Expert Retired Lt Colonel Bill Hagestad II, and former Federal Prosecutor US Department of Justice Jonathan Rusch, with the ep...

    Share
    Mark as Played
    September 9, 2020 42 min

    Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS. 

    Here are links to the security resources mentioned during...

    Share
    Mark as Played

    Popular Podcasts

      If you can never get enough true crime... Congratulations, you’ve found your people.

      Dateline NBC

      Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

      Stuff You Should Know

      If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks then look no further. Josh and Chuck have you covered.

      Morbid: A True Crime Podcast

      It’s a lighthearted nightmare in here, weirdos! Morbid is a true crime, creepy history and all things spooky podcast hosted by an autopsy technician and a hairstylist. Join us for a heavy dose of research with a dash of comedy thrown in for flavor.

      The Bobby Bones Show

      Listen to 'The Bobby Bones Show' by downloading the daily full replay.

    Advertise With Us

    For You

      Music, radio and podcasts, all free. Listen online or download the iHeart App.

      Connect

      © 2021 iHeartMedia, Inc.

      • Help
      • Privacy Policy
      • Terms of Use
      • AdChoicesAd Choices