Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Cyber Physical Systems Security Podcasts
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading
1
Jay Catherine on Securing Logistics, OT in Retail
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40Jay Catherine, security architect for a major retailer, joins the Nexus Podcast to discuss the intricacies of securing logistics and operational technology within the retail sector. Catherine covers various aspects of logistics cybersecurity, including risks introduced by connecting OT and IoT to the network, and the challenges of managing third-pa…
…
continue reading
1
Why CISOs Are Rethinking Managed Security: Check Point’s Open Garden Approach | Lenny Krol
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of The Professional CISO Show, David Malicoat is joined by Lenny Krol, Head of Services Sales at Check Point Software, recorded live at GPSEC DFW. Lenny breaks down how Check Point’s services organization supports customers across both Check Point and third-party technologies, why an open ecosystem matters, and how CISOs can realist…
…
continue reading
1
Building Trust and Resilience Across the Future of Secure Connectivity
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07As 5G, IoT, and edge networks expand, secure connectivity defines digital trust. This session presents a practical roadmap for building resilience and governance into connected ecosystems. Using the proven CPD framework, this podcast will explore how leaders can embed commitment, preparedness, and discipline to ensure trust continuity.Dave Chatterj…
…
continue reading
In this session, we explored the critical importance of effective event security, emphasizing that security is not just about showing presence or fulfilling minimum requirements. True protection goes far beyond token gestures and requires a deep commitment to thorough planning, vigilance, and professionalism. Key discussion points included: Underst…
…
continue reading
1
Practical Zero Trust, Apprenticeships, and Learning to Learn in the Age of AI | Larry Woods
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13Episode 93: Practical Zero Trust, Apprenticeships, and Learning to Learn in the Age of AI Guest: Larry Woods Every breach has a story. Every leader has a strategy. In this episode of The Professional CISO Show, host David Malicoat sits down with Larry Woods, a seasoned cybersecurity executive, during the St. Louis stop of the U.S. Tour for a wide-r…
…
continue reading
1
Cyber at the Top: Leading a Converged Security Organization: Bridging Physical and Cyber Risk
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02As physical and digital threats collide, converged security models that unite physical and cyber protections under one strategy are becoming more essential. John Scimone, Chief Security Officer for Dell Technologies, offers guidance for CISOs looking to bridge physical and cyber security into one cohesive strategy.…
…
continue reading
1
HOU.SEC.CON Live: Merging Physical & Cyber Security + The Future of Threat Intelligence
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
…
continue reading
1
EP 77: Building a Cyber Physical System Device Library
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29Do you really know what’s on your network? A lot of OT devices are white labeled, meaning they have a brand name but under the hood they’re made by someone else. Sean Tufts, Field CTO for Claroty, explains how his team is using AI to sift through all the available data and build a cyber physical library that starts to add specificity to remediation…
…
continue reading
1
How CISOs Must Lead the Next Generation | Moses Bulus on AI, Data Security & Hybrid IT (Ep. 91)
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
…
continue reading
1
#6. Women on the Frontlines: Advancing Gender Diversity in the Private Security Sector
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29Women in the private security sector face unique challenges, yet their contributions are vital to the industry’s success. This panel will focus on strategies for retaining women in the sector, exploring how organisations can support, empower, and advance female talent in frontline and leadership roles. Through insightful discussions, we will uncove…
…
continue reading
1
A CISO's Field Guide to Securing AI Agents
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
…
continue reading
1
#5. What's Eating the Security Industry: How to Thrive in Today's Global Evolution
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30Drawing from extensive global research and observations, this discussion explores the transformative forces reshaping today's security landscape. As the traditional $10B high-security sector faces unprecedented change, a new $100B mainstream security market is emerging - one that builds upon historical foundations while breaking free from conventio…
…
continue reading
1
EP 76: Why Security Certs for New Medical Devices Might Just Work
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50Diversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.…
…
continue reading
1
#4. The Role of Standards, Testing and Certification in an Effective Procurement Strategy
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24• Recognise the six stages of delivering effective security • Considerations when selecting appropriate security performance standards • The ingredients of an effective specification • The hierarchy of evidence available to support the selection of effective solutions Speaker: - Richard Flint, Technical and Commercial Lead for Physical Security - B…
…
continue reading
1
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
…
continue reading
1
#3. Accelerating Action - Equalising the Gender Balance in Security
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode explores how the security industry can close the gender gap, spotlighting initiatives, leaders, and strategies driving meaningful change. Speakers: - Sarah Cork, Chief Growth Officer - City Group Security - Sarah Hayes, HR Director - Securitas Security Services (UK) Ltd - Louise Walker, Director - Tiger Events - Mo Fatah, Youth Develop…
…
continue reading
1
Christopher Frenz on Evidence-Based Security
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
…
continue reading
1
Cyber at the Top: Defining Strength─Building a Resilient Incident Response Capability
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
…
continue reading
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This …
…
continue reading
1
EP 75: IoT-based Living Off The Land Attacks and Air-Gapping Solar Systems
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02At Black Hat USA 2025, Dan Berte, IoT Director at Bitdefender, revisits his talk last year about hacking solar panels in light of the blackout in Spain and Portugal. While the Iberian Peninsula blackout wasn’t an attack, it shows how sensitive these systems are when mixing old and new technologies, and how living off the land attacks might someday …
…
continue reading
1
🎙️ Episode 90 | GPSEC DFW: The Modern CISO, AI, and the OT Frontier
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28🎙️ Episode Summary Episode 90 of The Professional CISO Show kicks off the GPSEC DFW series, recorded live in Dallas. Host David Malicoat welcomes Andy Lux, Kendall Reese, and Patrick Gillespie for a dynamic discussion on risk leadership, AI governance, and OT security. Together, they explore how the role of the CISO is evolving — from managing cont…
…
continue reading
1
#2. Gain Actionable Business Insights From Your Physical Security System
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02Physical security is more crucial than ever, as risks escalate due to skilled labour shortages, operational costs rise and businesses face threats from all directions. Modern organisations must embrace innovative and efficient technologies to not only safeguard their people and properties but also transform their business. In this session, Verkada …
…
continue reading
1
Championing Sustainable and Human-Friendly Security
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions t…
…
continue reading
Violence and Intimidation against women and girls is a societal problem that needs a whole society response. It is everyone’s business to want to see and drive the changes needed to promote safer communities that will allow them to prosper and flourish. We need to see a collective and cohesive response beyond law enforcement, driven by society, bus…
…
continue reading
1
Surviving Ransomware—and the Wilderness—with Zach Lewis
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Brought to you by: Check Point (www.checkpoint.com) Armis (www.armis.com) Guidepoint Security (www.guidepointsecurity.com) 🎙️ Episode Summary During The Professional CISO Show – St. Louis Tour Stop, Zach Lewis joins host David Malicoat to discuss his path from IT support to the executive suite, his experience navigating a real ransomware incident, …
…
continue reading
1
EP 74: Turning Surveillance Cameras on their Axis
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36At Black Hat USA 2025, Noam Moshe from Claroty’s Team 82 revealed several vulnerabilities in Axis Communications’ IP camera systems, including a deserialization flaw that could let attackers run remote code. The team worked with Axis to patch the issues. Moshe says that this case highlights the broader security risks still common in the billions of…
…
continue reading
1
From GenAI Prompts to OAuth Phishing: The Hidden Browser Risks - with Tommy Perniciaro
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Episode Summary Recorded live at HOU.SEC.CON, The Professional CISO Show welcomes Tommy Perniciaro, Director of Solutions Architecture at LayerX, to explore why the browser has become the least-instrumented layer in the modern security stack — and how CISOs can finally gain visibility and control over it. David and Tommy discuss everything from mal…
…
continue reading
1
Cybersecurity Awareness Month: Staying Safe Online
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the is…
…
continue reading
1
Magic, Mentalism, and the Modern CISO – with Gary Chan
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Episode Summary In this episode, host David Malicoat sits down in St. Louis, Missouri with Gary Chan, Chief Information Security Officer at SSM Health — and a professional Security Mentalist. Gary blends his background in cybersecurity, engineering, and mentalism to bring a refreshingly human and creative approach to leadership, awareness, and infl…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
continue reading
1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
continue reading
1
EP 73: BADBOX 2.0: Blurring the line between bots and human for cybercrime
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56Ad fraud driven by both humans and AI agents require new signals beyond traditional bot-vs-human checks. Gavin Reid and Lindsay Kaye from HUMAN Security discuss how monetization includes ad and click fraud (peach pit), selling residential proxy access, and operating botnets for hire and preventing harm requires dismantling criminal infrastructure a…
…
continue reading
1
The Human Operating System: A New Way to Think About Cyber Risk with Kate Goldman
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42Episode Summary In this episode, David Malicoat sits down with Kate Goldman, founder and CEO of Cybermaniacs, to challenge one of cybersecurity’s oldest assumptions — that humans are the weakest link. Kate argues it’s time for CISOs to rethink human risk, culture, and resilience in the modern organization. Together, David and Kate explore the emerg…
…
continue reading
1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading
1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading
1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading
1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading
1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading
1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading
1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading
1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading
1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading
1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading