Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Physical Systems Security Podcasts

show episodes
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
Artwork

4
The Security Briefing

The Security Event

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
  continue reading
 
Artwork

1
RSAC

RSAC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
ISU ECpE

Santosh Pandey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
  continue reading
 
Loading …
show series
 
Jay Catherine, security architect for a major retailer, joins the Nexus Podcast to discuss the intricacies of securing logistics and operational technology within the retail sector. Catherine covers various aspects of logistics cybersecurity, including risks introduced by connecting OT and IoT to the network, and the challenges of managing third-pa…
  continue reading
 
In this episode of The Professional CISO Show, David Malicoat is joined by Lenny Krol, Head of Services Sales at Check Point Software, recorded live at GPSEC DFW. Lenny breaks down how Check Point’s services organization supports customers across both Check Point and third-party technologies, why an open ecosystem matters, and how CISOs can realist…
  continue reading
 
As 5G, IoT, and edge networks expand, secure connectivity defines digital trust. This session presents a practical roadmap for building resilience and governance into connected ecosystems. Using the proven CPD framework, this podcast will explore how leaders can embed commitment, preparedness, and discipline to ensure trust continuity.Dave Chatterj…
  continue reading
 
In this session, we explored the critical importance of effective event security, emphasizing that security is not just about showing presence or fulfilling minimum requirements. True protection goes far beyond token gestures and requires a deep commitment to thorough planning, vigilance, and professionalism. Key discussion points included: Underst…
  continue reading
 
Episode 93: Practical Zero Trust, Apprenticeships, and Learning to Learn in the Age of AI Guest: Larry Woods Every breach has a story. Every leader has a strategy. In this episode of The Professional CISO Show, host David Malicoat sits down with Larry Woods, a seasoned cybersecurity executive, during the St. Louis stop of the U.S. Tour for a wide-r…
  continue reading
 
As physical and digital threats collide, converged security models that unite physical and cyber protections under one strategy are becoming more essential. John Scimone, Chief Security Officer for Dell Technologies, offers guidance for CISOs looking to bridge physical and cyber security into one cohesive strategy.…
  continue reading
 
🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
  continue reading
 
Do you really know what’s on your network? A lot of OT devices are white labeled, meaning they have a brand name but under the hood they’re made by someone else. Sean Tufts, Field CTO for Claroty, explains how his team is using AI to sift through all the available data and build a cyber physical library that starts to add specificity to remediation…
  continue reading
 
🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
  continue reading
 
Women in the private security sector face unique challenges, yet their contributions are vital to the industry’s success. This panel will focus on strategies for retaining women in the sector, exploring how organisations can support, empower, and advance female talent in frontline and leadership roles. Through insightful discussions, we will uncove…
  continue reading
 
AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
  continue reading
 
Drawing from extensive global research and observations, this discussion explores the transformative forces reshaping today's security landscape. As the traditional $10B high-security sector faces unprecedented change, a new $100B mainstream security market is emerging - one that builds upon historical foundations while breaking free from conventio…
  continue reading
 
Diversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.…
  continue reading
 
• Recognise the six stages of delivering effective security • Considerations when selecting appropriate security performance standards • The ingredients of an effective specification • The hierarchy of evidence available to support the selection of effective solutions Speaker: - Richard Flint, Technical and Commercial Lead for Physical Security - B…
  continue reading
 
Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
  continue reading
 
This episode explores how the security industry can close the gender gap, spotlighting initiatives, leaders, and strategies driving meaningful change. Speakers: - Sarah Cork, Chief Growth Officer - City Group Security - Sarah Hayes, HR Director - Securitas Security Services (UK) Ltd - Louise Walker, Director - Tiger Events - Mo Fatah, Youth Develop…
  continue reading
 
O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
  continue reading
 
A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
  continue reading
 
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This …
  continue reading
 
At Black Hat USA 2025, Dan Berte, IoT Director at Bitdefender, revisits his talk last year about hacking solar panels in light of the blackout in Spain and Portugal. While the Iberian Peninsula blackout wasn’t an attack, it shows how sensitive these systems are when mixing old and new technologies, and how living off the land attacks might someday …
  continue reading
 
🎙️ Episode Summary Episode 90 of The Professional CISO Show kicks off the GPSEC DFW series, recorded live in Dallas. Host David Malicoat welcomes Andy Lux, Kendall Reese, and Patrick Gillespie for a dynamic discussion on risk leadership, AI governance, and OT security. Together, they explore how the role of the CISO is evolving — from managing cont…
  continue reading
 
Physical security is more crucial than ever, as risks escalate due to skilled labour shortages, operational costs rise and businesses face threats from all directions. Modern organisations must embrace innovative and efficient technologies to not only safeguard their people and properties but also transform their business. In this session, Verkada …
  continue reading
 
Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
  continue reading
 
Violence and Intimidation against women and girls is a societal problem that needs a whole society response. It is everyone’s business to want to see and drive the changes needed to promote safer communities that will allow them to prosper and flourish. We need to see a collective and cohesive response beyond law enforcement, driven by society, bus…
  continue reading
 
Brought to you by: Check Point (www.checkpoint.com) Armis (www.armis.com) Guidepoint Security (www.guidepointsecurity.com) 🎙️ Episode Summary During The Professional CISO Show – St. Louis Tour Stop, Zach Lewis joins host David Malicoat to discuss his path from IT support to the executive suite, his experience navigating a real ransomware incident, …
  continue reading
 
At Black Hat USA 2025, Noam Moshe from Claroty’s Team 82 revealed several vulnerabilities in Axis Communications’ IP camera systems, including a deserialization flaw that could let attackers run remote code. The team worked with Axis to patch the issues. Moshe says that this case highlights the broader security risks still common in the billions of…
  continue reading
 
Episode Summary Recorded live at HOU.SEC.CON, The Professional CISO Show welcomes Tommy Perniciaro, Director of Solutions Architecture at LayerX, to explore why the browser has become the least-instrumented layer in the modern security stack — and how CISOs can finally gain visibility and control over it. David and Tommy discuss everything from mal…
  continue reading
 
It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
  continue reading
 
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the is…
  continue reading
 
Episode Summary In this episode, host David Malicoat sits down in St. Louis, Missouri with Gary Chan, Chief Information Security Officer at SSM Health — and a professional Security Mentalist. Gary blends his background in cybersecurity, engineering, and mentalism to bring a refreshingly human and creative approach to leadership, awareness, and infl…
  continue reading
 
This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
  continue reading
 
This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
  continue reading
 
This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
  continue reading
 
Ad fraud driven by both humans and AI agents require new signals beyond traditional bot-vs-human checks. Gavin Reid and Lindsay Kaye from HUMAN Security discuss how monetization includes ad and click fraud (peach pit), selling residential proxy access, and operating botnets for hire and preventing harm requires dismantling criminal infrastructure a…
  continue reading
 
Episode Summary In this episode, David Malicoat sits down with Kate Goldman, founder and CEO of Cybermaniacs, to challenge one of cybersecurity’s oldest assumptions — that humans are the weakest link. Kate argues it’s time for CISOs to rethink human risk, culture, and resilience in the modern organization. Together, David and Kate explore the emerg…
  continue reading
 
This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
  continue reading
 
This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
  continue reading
 
This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
  continue reading
 
This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
  continue reading
 
This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
  continue reading
 
This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
  continue reading
 
This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
  continue reading
 
This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
  continue reading
 
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
  continue reading
 
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
  continue reading
 
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
  continue reading
 
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
  continue reading
 
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
  continue reading
 
This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
  continue reading
 
This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play