Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:44
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading
1
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
32:31
32:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:31
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
…
continue reading
1
The Security Sandbox | Modernizing Cyber Risk Management in OT
31:42
31:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:42
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
…
continue reading
1
The Security Sandbox | Evolving Endpoint Security in OT
31:23
31:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:23
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
…
continue reading
1
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
32:14
32:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:14
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
…
continue reading
1
What is Incident Response? | Nozomi Networks
42:56
42:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
42:56
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incid…
…
continue reading
1
What is Threat Detection? | Nozomi Networks
37:26
37:26
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:26
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further. Learn more with Nozomi Networks Cybersecurity…
…
continue reading
1
What is Zero Trust Security? I Nozomi Networks
22:53
22:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:53
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design appr…
…
continue reading
1
What is Cyber Risk Management? | Nozomi Networks
37:10
37:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:10
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou. Visit Our Website Follow Us on Link…
…
continue reading
1
A Day in the Life of an OT Responder
1:01:55
1:01:55
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:01:55
Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, process, and respond to a situation. In this case, we look at what a typical day an Operational Technology (OT) responder must endure and why this role is crucial within critical infrastructure and in…
…
continue reading
1
Cyber and Operational Resilience for Smart Factories
1:00:32
1:00:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:00:32
Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge. Visit Our Website Follow Us on LinkedInVon Nozomi Networks
…
continue reading
1
OT Network Security Challenges in Enterprise Environments
1:02:40
1:02:40
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:02:40
Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation. Visit Our Website Follow Us on LinkedInVon Nozomi Networks
…
continue reading
1
Monitoring & Protecting Assets in Critical Infrastructure
1:03:05
1:03:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:03:05
Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your assets. Visit Our Website Follow Us on LinkedInVon Nozomi Networks
…
continue reading
1
In a World of Unsecure IoT - Is Privacy Dead?
1:02:04
1:02:04
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:02:04
Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a world, just how important is privacy, data security and protecting our IoT infrastructure? Learn about the complex issues of privacy and privilege in this episode. Visit Our Website Follow Us on Linke…
…
continue reading
1
Understanding the Risks to Operational Technology (OT)
1:00:26
1:00:26
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:00:26
Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk pl…
…
continue reading
1
Defending Smart Cities from Cyber Threats
1:00:59
1:00:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:00:59
Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. Visit Our Website Follow Us on LinkedInVon Nozomi Networks
…
continue reading
1
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
18:38
18:38
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
18:38
PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. Visit Our Website Follow Us on LinkedIn…
…
continue reading
1
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
1:01:05
1:01:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:01:05
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of le…
…
continue reading
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and…
…
continue reading
1
Improving Transportation System Operational Visibility and Security
56:58
56:58
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
56:58
The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper…
…
continue reading
1
Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
54:36
54:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
54:36
To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting critical infrastructure and industrial operations. Join us for a discussion on the current OT/IoT threat landscape, supply chain threats to OT and IoT environments, ransomware risks, and how to prote…
…
continue reading
1
Dissecting the Security Implications of the Australian Critical Infrastructure Act
59:03
59:03
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
59:03
What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act's impact upon the Australian industrial landscape. This episode explores the motivations be…
…
continue reading
1
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity
50:01
50:01
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
50:01
Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage cyber risks, minimize disruptions and ensure safety. Special guest Jim Guinn, Global Managing Director with Ac…
…
continue reading
1
Serious Workplace Accidents and Their Connection to Cybersecurity
59:42
59:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
59:42
An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive leadership teams accountable, is raising the stakes for corporations, boards and senior executives. In this episode, learn about corporate cyber risk and workplace safety laws from experts in cyber espio…
…
continue reading
1
Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars
26:02
26:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:02
Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected and protected vehicles. General Motors’ 1977 Oldsmobile Toronado was the first production car to incorporate embedded software. Today, automotive manufacturing is one of the most widely automated indust…
…
continue reading
1
Ngoc Phan – Managing Business During Times of Turmoil
15:42
15:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:42
Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing to address the uncertainty and volatility, and how he’s helped the company pull together to launch a new SaaS solution (Vantage), and find new ways to support customers, employees, and partners. To lea…
…
continue reading
1
P2P Botnets: Following the Network Trail
34:37
34:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
34:37
To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been a…
…
continue reading
1
Stephen Driggers – How the Customer Experience Leads to a Better OT Security Solution
13:48
13:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
13:48
Learn why Stephen, Nozomi Networks’ Chief Revenue Officer, believes in creating an amazing customer experience at every touch point. He shares how listening closely to customer feedback and responding quickly to their requests leads to a much better OT/IoT security solution. To learn more about Stephen, visit: https://www.nozominetworks.com/company…
…
continue reading
1
Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
43:37
43:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:37
In this episode, learn how digital transformation has been fuelled by a global pandemic that forced many of us to work from home. Security visionaries from Schneider Electric and Nozomi Networks discuss the latest trends in industrial cybersecurity that have developed from the need for secure remote access, and cover a use case for an innovative se…
…
continue reading
1
Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?
36:05
36:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:05
As you move some or all of your data and applications from on-prem to the cloud, you may need to rethink your security strategy. This episode covers cloud options – private, public, and SaaS – to help you determine which is the right one for you. Panelists also discuss the risks of failing to ensure that your security infrastructure is ready before…
…
continue reading
1
Edgard Capdevielle – From Startup to Industry Leader
18:30
18:30
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
18:30
Hear from Nozomi Networks’ President and CEO Edgard Capdevielle how the company transformed from a startup of seven people in the U.S. and Switzerland into a global OT and IoT security leader in less than seven years. To learn more about Edgard and Nozomi Networks' path to success, visit: https://www.nozominetworks.com/company/leadership Visit Our …
…
continue reading
1
Moreno Carullo – Using Artificial Intelligence and Machine Learning in Cybersecurity
19:15
19:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:15
Learn why Moreno Carullo launched Nozomi Networks with university-mate Andrea Carcano in 2013, and how artificial intelligence and machine learning are being used to drive OT security automation and increase the effectiveness of small cybersecurity teams. Moreno also discusses how Nozomi Networks uses these two technologies to provide up-to-date th…
…
continue reading
1
Cyber Crime Migration to Critical Infrastructure
58:48
58:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
58:48
In this episode, find out what every critical infrastructure and industrial operation should know to keep operations safe. Learn about cyber espionage, and how the lines are blurring between organized cybercrime and nation-sponsored efforts. Nozomi Networks’ Phillip Page is joined by Chinese Cyber Espionage Expert Retired Lt Colonel Bill Hagestad I…
…
continue reading
1
How to Use the MITRE ATT&CK Framework
42:55
42:55
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
42:55
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE fo…
…
continue reading
1
Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution
35:34
35:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:34
Learn about the pitfalls typically encountered when choosing an OT/IoT cybersecurity solution. From evaluation to selection, purchase, and deployment, this podcast covers the most important questions to ask the vendors you’re considering, and ways to successfully navigate past the key hazards. Join Nozomi Networks host Chris Grove and CMO Kim Legel…
…
continue reading
1
Alessandro Di Pinto – A Day in the Life of a Threat Analyst
32:12
32:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:12
Learn about Alessandro’s path from pen tester to threat analyst, and what a threat analyst does day-to-day. Find out more about the activities that Alessandro and his security research team are involved in: looking for new threats reported by the security community, gathering samples, analyzing their behavior and creating efficient signatures to pr…
…
continue reading
1
Alan Berusch - The Role of Culture in Company Success
16:30
16:30
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:30
This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain insight into their tactics, techniques and procedures, as well as recommendations for securing your OT/IoT networks. You’ll also learn about the top ICS vulnerabilities of 2020, and their ongoing imp…
…
continue reading
1
OT/IoT Security Report 2020
51:45
51:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:45
This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain insight into their tactics, techniques and procedures, as well as recommendations for securing your OT/IoT networks. You’ll also learn about the top ICS vulnerabilities of 2020, and their ongoing imp…
…
continue reading
1
Chet Namboodri – The Power of Partnerships: Taking OT Cybersecurity to the Next Level
22:47
22:47
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:47
As Nozomi Networks VP of Worldwide Business Development and Channel Sales, Chet Namboodri knows the value of partnerships. Learn how partnering between security providers creates better solutions, and what type of partners Nozomi Networks looks for. Also, find out what changes Chet sees in the future, as the partnership landscape evolves to address…
…
continue reading
1
Kim Legelis – What’s Being Done to Protect Us from the Bad Guys
15:25
15:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:25
Find out what led Nozomi Networks CMO Kim Legelis to cybersecurity, and who the bad guys are in the current OT/IoT security landscape. Learn what security experts are doing to protect us from cyberattacks on critical infrastructure. Kim also shares her thoughts on how the discussion has shifted from explaining the need for cybersecurity to focusing…
…
continue reading
1
Improving SOC Efficiency
48:51
48:51
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
48:51
How should Security Operations Center (SOC) analysts face the often-overwhelming number of alerts triggered by ICS and IoT systems? Find out why alerts can be a problem, and how you can avoid common SOC monitoring pitfalls. Nozomi Networks CPO & Co-founder Andrea Carcano and host Chris Grove also cover how automated OT/IoT monitoring and anomaly de…
…
continue reading
1
Smart Grids: Securing Encrypted Communications
1:01:53
1:01:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:01:53
In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of encrypted OT/IoT systems. Nozomi Networks security researchers combine research with field expertise to drill into what is being done, using IEC 62351 as an example. They also cover two different attack …
…
continue reading
1
The IoT Botnet Threat: What It Is and How to Deal with It
43:02
43:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:02
Learn about IoT botnet threats from Nozomi Networks security researchers, including common propagation techniques, hacktivism, and strategies to protect your own networks. This episode discusses Dark Nexus, an IoT botnet that uses DDoS attacks for financial gain, and which has been active over the last few months. The related webinar shows a real-t…
…
continue reading
1
Viruses Are Disrupting Our Supply Chains - Where Do The Biggest Vulnerabilities Lie?
35:52
35:52
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:52
COVID-19 has disrupted supply chains across the world. But disruptions to the manufacturing supply chain are surprisingly common, due to equipment failure, component unavailability, or nation-state sponsored cyberattacks. Learn how manufacturers and supply chain members can protect themselves, with panelist Armando Seay, Director of DreamPort. Here…
…
continue reading
1
Andrea Carcano: Getting to Know an OT Security Entrepreneur
45:51
45:51
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
45:51
What kind of person and what kind of effort does it take to become an OT security entrepreneur? Host Chris Grove interviews founder Andrea Carcano to learn about his background and the early startup days of Nozomi Networks. Don’t miss this free-wheeling and fun discussion, and learn the first example of the company “never giving up”. For more infor…
…
continue reading
1
Suzanne Spaulding: Dealing with OT & IoT Security in the COVID-19 Era
37:41
37:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:41
Suzanne Spaulding, former DHS Undersecretary for Cybersecurity, provides interesting insights into nation-state threats during COVID-19, the Solarium Cybersecurity Commission recommendations, election security and more. Join host Andrea Carcano and host Chris Grove for this discussion, including practical recommendations and resources for real-time…
…
continue reading
1
Remote Access Monitoring: What To Watch Out For During the COVID-19 Pandemic
29:55
29:55
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:55
Working from home is now the norm for millions of people, including those maintaining safe industrial operational processes. Join host Andrea Carcano and guests Scott Smith and Chris Grove as they discuss remote access monitoring, including what to monitor, free tools that can be used to do safe OT/IoT network monitoring, and other best practices. …
…
continue reading
1
The Emerging Threat Intel Landscape: How Hackers Are Using COVID-19
45:19
45:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
45:19
Andrea Carcano talks with colleagues Alexander Di Pinto and Chris Grove about the evolving COVID-19 threat landscape. Their discussion covers how threats are changing, the techniques used by hackers to perform attacks, and the sectors targeted by phishing campaigns. Alessandro describes the free threat intelligence downloads he helped create, and h…
…
continue reading