מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Cyber Physical Systems Security Podcasts
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading
1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
continue reading
1
Mark Korman Chief Legal & Strategy Officer @Critical-Impact about cyber crises aspects to consider
48:28
48:28
Play later
Play later
Lists
Like
Liked
48:28Prevention tools are essential, but have their limits; no one can prevent every breach. Readiness determines how quickly and effectively you regain control once it happens. Tabletop exercises, crisis playbooks, and decision-making drills are the true differentiators. Nachshon Pincu hosts Mark Korman, Chief Legal and Strategy Officer at Critical-Imp…
…
continue reading
20 years after their paths first crossed, three Canadian security professionals regroup to discuss a new risk management strategy book based on hard won field experience. Patrick Hayes was a security strategist before organizations knew this was success differentiator. For decades he has been guiding organizations large and small, public, private a…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
continue reading
1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading
1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading
1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading
1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading
1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading
1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading
1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading
1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading
1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading
1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading
1
Episode 2 - Cryptography's Engineering of Trust
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
…
continue reading
1
Episode 1 - The Protocol Paradox in Cryptography and System Security
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
…
continue reading
1
Trailer - Secure Math Collapses in the Real World
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
…
continue reading
1
Ophir Oren Cyber & AI sec Innovation squad leader @Bayer on cyber innovation & future challenges
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57חדשנות בסייבר היא צורך קיומי, קצב השינוי בראיית התוקפים ומשטחי תקיפה חדשים שנוצרים חדשות לבקרים לא מאפשרים לצוותי ההגנה לנוח על זרי הדפנה מרבית צוותי הסייבר בחברות עסוקים במימושים של הגנות ולעיתים קרובות נותנים היום מענה לאתמול ופחות למחר. הצורך בצוות שיבצע חשיבה ובדיקות לאיומי המחר ומציאת פתרונות טכנולוגים הפך לכורח המציאות נחשון פינקו מארח את אופ…
…
continue reading
1
Adm. Michael Rogers on Deterrence in Cyberspace
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
…
continue reading
1
Refael Franco founder & CEO @CodeBlue on the October 7th war cyber-attacks, IR and crisis management
46:36
46:36
Play later
Play later
Lists
Like
Liked
46:36הפרק מוקדש לזכרו של אריק קראוניק גיבור ישראל, רבש"צ קיבוץ בארי שנרצח ב-7 לאוקטובר בשעה שנלחם להגן על הישוב מפני הפורעים, יהי זכרו ברוך זה עדיין לא הזמן לסיכומים של מלחמת חרבות ברזל שטרם הסתיימה, המלחמה הארוכה ביותר בתולדות מדינת ישראל שהתפצלה בהמשך למלחמות משנה מול החיזבאללה, אירן והחותים בעולם הסייבר אנו חווים את השפעות המלחמה יום יום עם כמות התקפ…
…
continue reading
1
Shmulik Yehezkel Founder & CEO @Pryvaxy on the tight coloration between physical & cyber defense
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49ביטחון פיזי והגנת סייבר הם שני צדדים של אותה המטבע, כול אחד מהם מהווה השלמה של השני וחשוב למניעת מתקפה על הארגון. ארגונים שאינם ביטחוניים נוטים להפריד ביניהם ושוברים את קו ההגנה הרגיש ממילא נחשון פינקו מארח את אל"מ (מיל'), מייסד ומנכ"ל חברת פריבקסי מבכירי משרד ראש הממשלה לשעבר מקים וראש חטיבת הסייבר המבצעי של משרד הביטחון, ראש בית הספר לסייבר וטכנו…
…
continue reading
1
Bob Maley on Resource Challenges in Cybersecurity
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
…
continue reading
1
Haim Halevy Sela CISO @critical infrastructure power plants on challenges & cyber @Energy industry
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42שני סיסויים נכנסים לאולפן.....נשמע כמו התחלה של בדיחה טובה. הגנה על תשתיות קריטיות היא משימה מורכבת, האחריות מחד והצורך ללהטט בין הרגולציה להנהלה מאידך נחשון פינקו מארח את חיים הלוי סלע סיסו מוכר ומוערך באחת מחברות האנרגיה הגדולות בישראל לשיחת סיסויים על תחושת האחריות, ההתמודדות היום יומית עם סייבר בתקופת מלחמה, האם הרגולציה עוזרת או מפריעה, איך בו…
…
continue reading
Part 2 of this summer break episode takes a bit of a light hearted look at the cyber security industry predictions that become the norm in late December and early January. Eight or nine months later, how accurate where they? Take a listen, there are a couple surprises. The conversation uncovers a few ongoing challenges with the cyber security indus…
…
continue reading
1
Yossi Shani Founder & CEO @YazamTech about files inspection, Deep Scan & CDR
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
…
continue reading
1
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in cal…
…
continue reading
1
Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote Access
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק…
…
continue reading
The summer show started with the light hearted goal of evaluating the top security predictions that fill the internet in late December each year. Forever unscripted, Tim and Doug wind up reflecting on the growing gap between physical and virtual information systems. While it is easy to lament, from a cognitive perspective there is little hope, the …
…
continue reading
1
Rui Ataide on Navigating Ransomware Negotiations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
…
continue reading
1
Eliaz Vakenin Head of Sectoral Guidance Team on "what is the next step" for Pro mid-level managers
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26רבות מדובר על ג'וניורים והכניסה הקשה לתחום הסייבר למי שלא הגיע מהיחידות הטכנולוגיות בצבא, מה קורה עם אותם אלו שכבר נמצאים בתחום ומנסים לפלס את דרכם מעלה. מה הדרך להמשיך לרכוש ידע וכלים על מנת להתקדם לתפקידים ניהוליים והאם לימודי המשך מומלצים נחשון פינקו מארח את אליעז ועקנין ראש צוות הנחייה מגזרי וארכיטקט סייבר בשיחה על "מה השלב הבא" של מנהלים מקצוע…
…
continue reading
Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces…
…
continue reading
1
Almog Apirion CEO & Co-Founder @Cyolo on Remote Privileged Access for OT & Cyber-Physical Systems
46:44
46:44
Play later
Play later
Lists
Like
Liked
46:44גישה מאובטחת מרחוק למערכות הארגוניות הפכה לכורח המציאות מאז הקורונה והצורך עלה בישראל ביתר שאת אחרי השביעי באוקטובר. במערכות פיזיות ותפעוליות גישה מאובטחת מרחוק היא צורך קיומי מחד, על מנת לאפשר תפעול תקלות 24 שעות ביממה. מאידך יש צורך בבקרה קפדנית על מי מתחבר, איך ולאן כולל תיעוד של כול הפעילויות שמתבצעות שוק חברות הטכנולוגיה שעוסקות בגישה מרחוק לס…
…
continue reading
Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clie…
…
continue reading
1
Shaya Feedman Ex Head of Information Security @Porsche Digital about cars functional safety & cyber
41:54
41:54
Play later
Play later
Lists
Like
Liked
41:54כשאתם נכנסים לרכב שלכם כמה מחשבה אתם מקדישים לעובדה שאתם בתוך דאטה-סנטר עצום, איך מתמודדים בטיחותית וסייברית עם מפעל שיש בו עשרות רבות ולעיתים מאות מחשבים עם שתי רשתות תקשורת שלפחות אחת מוגדרת כקריטית וכול זה ממוזער ונדחס לרכב אחד אין ספק שבטיחות והגנת סייבר בתעשיית הרכב היא אחד האתגרים הקשיים שיש החל משלב התכנון, דרך שרשרת אספקה ועד הרכב עצמו. נחש…
…
continue reading
1
Uri Hartmann Founder & CTO @t42 about Human genome research and future cyber impact
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52יכולות ביולוגיות של אורגניזמים וגופים חיים מהווים בסיס מחקר לצורך קפיצת מדרגה טכנולוגית, החל מרשתות נוירונים המדמות את הרשת העצבית שהובילה להתפתחות ההיי.איי, מחשוב קוונטי, רכיבי אחסון ביולוגים והרשימה עוד ארוכה. פרויקט הגנום האנושי שבמסגרתו רוצף לראשונה הגנום האנושי על כל 25-20 אלף הגנים שלו וכשלושה מיליארדי הבסיסים שמהם הוא מורכב. הפרויקט יצא לדרך…
…
continue reading
1
ESRM roots, revelations & resilience with John Petruzzi
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Enterprise Security Risk Management (ESRM) principles appear in almost every episode and this one is a bit more overt because it features two of the three people responsible for promoting ESRM in the early days of it's reintroduction through ASIS. John Petruzzi is now the CEO of Unlimited Technology and leading them toward an expanded influence in …
…
continue reading
1
Dan Berte on Solar Grid and IoT Vulnerabilities
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initia…
…
continue reading
1
Alex Peleg Co-Founder @Cynergy & Cilynx on Continence threat exposure management & cyber deployment
50:09
50:09
Play later
Play later
Lists
Like
Liked
50:09ביצוע תקופתי של סקרי סיכוני סייבר ומבדקי חדירות על גווניהם השונים הפכו כבר מזמן לסטנדרט ועדיין אנשי מקצוע מרגישים מאוימים מהתוצאות ולעיתים המידע שמועבר פשוט זוכה להתעלמות. תופעה לא ברורה שמקורה כנראה בטבע האנושי ונדרש לתת עליה את הדעת נחשון פינקו מארח את אלכס פלג מייסד שוטף בחברות סינרגי וסילינקס בשיחה על סייבר בכלל, היכולת כמומחה סייבר ואקר לבן לש…
…
continue reading
1
Vivek Ponnada on the Ongoing Maturity of OT Security
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55OT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabili…
…
continue reading
1
Gil Groskop VP Technology & Digital Transformation @Mekorot on moving tech forward & cyber by design
54:22
54:22
Play later
Play later
Lists
Like
Liked
54:22פעמים אנחנו שוכחים שמים הם חלק מתעשיית המזון, האחריות של אספקת מים היא לא רק ברציפות האספקה בכול תנאי אלא גם עמידה בדרישות האיכות. בישראל קיימות שתי חברות תשתית גדולות כאשר מקורות היא אחת מהן עם אלפי אתרים ומערכות בקרה שפרוסות על פני כול המדינה. הצורך לאחד בין ביטחון פיזי לביטחון סייבר יחד עם הזרמת מידע בזמן אמת עד לאחרון העובדים היא אתגר שדורש תכנ…
…
continue reading
1
Austin Allen on the Cybersecurity Realities Facing Healthcare
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations. Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impactin…
…
continue reading
1
Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said. To disrupt the U.S.' standing as such, these …
…
continue reading
1
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG systems are an industrial control system that monitors fuel levels inside storage tanks, i…
…
continue reading
1
Steven Sim on OT-ISAC and the State of Information Sharing
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organization…
…
continue reading