Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Cyber Physical Systems Security Podcasts
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading
1
#4. The Role of Standards, Testing and Certification in an Effective Procurement Strategy
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24• Recognise the six stages of delivering effective security • Considerations when selecting appropriate security performance standards • The ingredients of an effective specification • The hierarchy of evidence available to support the selection of effective solutions Speaker: - Richard Flint, Technical and Commercial Lead for Physical Security - B…
…
continue reading
1
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
…
continue reading
1
#3. Accelerating Action - Equalising the Gender Balance in Security
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode explores how the security industry can close the gender gap, spotlighting initiatives, leaders, and strategies driving meaningful change. Speakers: - Sarah Cork, Chief Growth Officer - City Group Security - Sarah Hayes, HR Director - Securitas Security Services (UK) Ltd - Louise Walker, Director - Tiger Events - Mo Fatah, Youth Develop…
…
continue reading
1
Christopher Frenz on Evidence-Based Security
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
…
continue reading
1
#2. Gain Actionable Business Insights From Your Physical Security System
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02Physical security is more crucial than ever, as risks escalate due to skilled labour shortages, operational costs rise and businesses face threats from all directions. Modern organisations must embrace innovative and efficient technologies to not only safeguard their people and properties but also transform their business. In this session, Verkada …
…
continue reading
Violence and Intimidation against women and girls is a societal problem that needs a whole society response. It is everyone’s business to want to see and drive the changes needed to promote safer communities that will allow them to prosper and flourish. We need to see a collective and cohesive response beyond law enforcement, driven by society, bus…
…
continue reading
20 years after their paths first crossed, three Canadian security professionals regroup to discuss a new risk management strategy book based on hard won field experience. Patrick Hayes was a security strategist before organizations knew this was success differentiator. For decades he has been guiding organizations large and small, public, private a…
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the is…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
continue reading
1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
continue reading
1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading
1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading
1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading
1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading
1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading
1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading
1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading
1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading
1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading
1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading
1
Episode 2 - Cryptography's Engineering of Trust
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
…
continue reading
1
Episode 1 - The Protocol Paradox in Cryptography and System Security
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
…
continue reading
1
Trailer - Secure Math Collapses in the Real World
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
…
continue reading
1
Adm. Michael Rogers on Deterrence in Cyberspace
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
…
continue reading
1
Bob Maley on Resource Challenges in Cybersecurity
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
…
continue reading
Part 2 of this summer break episode takes a bit of a light hearted look at the cyber security industry predictions that become the norm in late December and early January. Eight or nine months later, how accurate where they? Take a listen, there are a couple surprises. The conversation uncovers a few ongoing challenges with the cyber security indus…
…
continue reading
1
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in cal…
…
continue reading
The summer show started with the light hearted goal of evaluating the top security predictions that fill the internet in late December each year. Forever unscripted, Tim and Doug wind up reflecting on the growing gap between physical and virtual information systems. While it is easy to lament, from a cognitive perspective there is little hope, the …
…
continue reading
1
Rui Ataide on Navigating Ransomware Negotiations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
…
continue reading
Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces…
…
continue reading
Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clie…
…
continue reading
1
ESRM roots, revelations & resilience with John Petruzzi
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Enterprise Security Risk Management (ESRM) principles appear in almost every episode and this one is a bit more overt because it features two of the three people responsible for promoting ESRM in the early days of it's reintroduction through ASIS. John Petruzzi is now the CEO of Unlimited Technology and leading them toward an expanded influence in …
…
continue reading
1
Dan Berte on Solar Grid and IoT Vulnerabilities
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initia…
…
continue reading
1
Vivek Ponnada on the Ongoing Maturity of OT Security
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55OT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabili…
…
continue reading
1
Austin Allen on the Cybersecurity Realities Facing Healthcare
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations. Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impactin…
…
continue reading
1
Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said. To disrupt the U.S.' standing as such, these …
…
continue reading
1
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG systems are an industrial control system that monitors fuel levels inside storage tanks, i…
…
continue reading
1
Steven Sim on OT-ISAC and the State of Information Sharing
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organization…
…
continue reading
1
Global Risk Management as Strategic Advantage with Dominic Bowen
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50The Caffeinated Risk hosts navigate time zones and catch up with Dominic Bowen traveling between meetings to discuss risk management with an international expert on the subject. Mr. Bowen is a partner and Head of Strategic Advisory at 2Secure, one of Europe's leading risk management consulting firms, as well as the host of the International Risk Po…
…
continue reading
Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the EU's Cyber Resilience Act and what it means for manufacturers of "products with digital elements" as they aim toward a 2027 compliance deadline. Sarah provides her insight on the regulation's essential requirements, its focus on secure-by-de…
…
continue reading
1
Andrew Ohrt on Cyber-Informed Engineering
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Andrew Ohrt, the resilience practice area lead at West Yost, joins the Nexus Podcast to discuss cyber-informed engineering (CIE) and how it informs engineers and asset operators to understand their role in creating and maintaining a cyber resilient organization. According to Ohrt, CIE is one of the best examples of delivering cybersecurity concepts…
…
continue reading
1
Megan Stifel on the Impact of the Ransomware Task Force
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the Nexus Podcast to discuss the four years of progress and challenges experienced by the Ransomware Task Force. The RTF was created days before the Colonial Pipeline ransomware incident and in a landmark report, laid out 48 recommendations to the industry tha…
…
continue reading
1
Joe Slowik on Identifying Truly 'Critical' Infrastructure
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly "critical," and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped. Slowik acknowledges that while calling everything "critical" ensures that nothing …
…
continue reading
1
Danielle Jablanski on Critical Infrastructure Protection
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26Danielle Jablanski, Industrial Control Systems Strategist & Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government's role as a cybersecurity partner on implementation guidance and enablement. Danielle touches on a number of areas of CI security and protection, ranging …
…
continue reading