Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Claroty Podcasts
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
Want to know how to build market-leading technology products? Want to know how to take a startup from nothing multi-billion dollar exit? Zero To Exit is the best business and technology podcast series that will share deep insights from industry leaders on how they successfully led multiple products and companies to critical success. We will invite guests who have been on the battlefield for many years and can share their unique insights on building products, sales machines, company culture, ...
…
continue reading
1
Adm. Michael Rogers on Deterrence in Cyberspace
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
…
continue reading
1
What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. Th…
…
continue reading
1
Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), pract…
…
continue reading
1
Hidden Cybersecurity Vulnerabilities in Today’s Data Centers
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59
…
continue reading
1
Building OT Cybersecurity That Works in the Real World
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46Industrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must c…
…
continue reading
1
Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29Hosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market. The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-…
…
continue reading
1
Responsibility Without Authority: The CISO's Industrial Cybersecurity Dilemma
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44In this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. While executives are tasked with ensuring resilience and reporting to the board, they often hit resistanc…
…
continue reading
1
Bob Maley on Resource Challenges in Cybersecurity
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
…
continue reading
1
The Critical Role of Local Knowledge in Industrial Cybersecurity
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In this essential rewind episode, Dino Busalachi and Craig Duckworth address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection. The Power of Local Partnership Dino emphasizes a crucial principle that often gets overlooked in cyb…
…
continue reading
1
FBI Alerts, OT Vulnerabilities, and What Comes Next
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05In this episode, Craig and Dino break down the FBI’s latest cybersecurity advisory and what it means for industrial organizations. From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. They discuss why manufacturing has become …
…
continue reading
1
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT t…
…
continue reading
1
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT t…
…
continue reading
1
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in cal…
…
continue reading
1
AI, Phishing, and the Future of Industrial Cyber Defense
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27In this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransom…
…
continue reading
1
Rui Ataide on Navigating Ransomware Negotiations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
…
continue reading
1
Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecuri…
…
continue reading
Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces…
…
continue reading
1
From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT securit…
…
continue reading
Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clie…
…
continue reading
1
When the Plant Can't Stop: Securing Systems That Never Sleep
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the …
…
continue reading
1
The Lawyer's View: Strategic Lessons in Cybersecurity and Incident Response
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Craig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today’s hyper-connected, AI-augmented threat landscape. Josh shares hard-earne…
…
continue reading
1
Dan Berte on Solar Grid and IoT Vulnerabilities
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initia…
…
continue reading
1
Plant-Level Cyber Risk: Who’s Actually Responsible?
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control …
…
continue reading
1
Vivek Ponnada on the Ongoing Maturity of OT Security
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55OT cybersecurity veteran Vivek Ponnada, SVP Growth & Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabili…
…
continue reading
1
The C-Suite's Role in Industrial Cybersecurity
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11In this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cy…
…
continue reading
1
Austin Allen on the Cybersecurity Realities Facing Healthcare
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations. Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impactin…
…
continue reading
1
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT team…
…
continue reading
1
Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said. To disrupt the U.S.' standing as such, these …
…
continue reading
1
The System Integrator’s Role in Supporting OT Security
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38In this episode, Craig Duckworth and Dino Busalachi discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity. Key Issues Identified: Organizations typically work with multiple specialized integrators across different facilities and systems Some SIs lack cybersecurity expertise, focusing…
…
continue reading
1
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG systems are an industrial control system that monitors fuel levels inside storage tanks, i…
…
continue reading
1
When IT Cyber Events Bring Down the Plant Floor
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Craig and Dino break down how cyberattacks that start in traditional IT systems can shut down entire manufacturing production lines, leading to massive financial losses. Using real-world examples like UNFI's $500 million drop in market value in 60 hours, they explain how overlooked connections between IT and the OT plant floor are often the weakest…
…
continue reading
1
Steven Sim on OT-ISAC and the State of Information Sharing
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organization…
…
continue reading
Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the EU's Cyber Resilience Act and what it means for manufacturers of "products with digital elements" as they aim toward a 2027 compliance deadline. Sarah provides her insight on the regulation's essential requirements, its focus on secure-by-de…
…
continue reading
1
When CISOs Inherit the Plant Floor: What Happens Next?
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50What happens when the CISO inherits responsibility for the security of the plant floor? Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility. A perpetuating trend exists where cybersecurity leade…
…
continue reading
1
Reflections from the Front Lines of Industrial Cyber Failures
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58In this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insid…
…
continue reading
1
What Every CISO Gets Wrong About OT Security
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51In this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. But is it truly convergence or more of a collision? Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and s…
…
continue reading
1
Andrew Ohrt on Cyber-Informed Engineering
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Andrew Ohrt, the resilience practice area lead at West Yost, joins the Nexus Podcast to discuss cyber-informed engineering (CIE) and how it informs engineers and asset operators to understand their role in creating and maintaining a cyber resilient organization. According to Ohrt, CIE is one of the best examples of delivering cybersecurity concepts…
…
continue reading
1
Megan Stifel on the Impact of the Ransomware Task Force
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the Nexus Podcast to discuss the four years of progress and challenges experienced by the Ransomware Task Force. The RTF was created days before the Colonial Pipeline ransomware incident and in a landmark report, laid out 48 recommendations to the industry tha…
…
continue reading
1
OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45In this special rewind edition of Industrial Cybersecurity Insider, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into …
…
continue reading
1
Bridging the IT-OT Divide with AI-Powered Insight
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Dino and Craig tackle one of the most misunderstood challenges in cybersecurity for industrial environments. The persistent disconnect between IT-led cybersecurity tools and operational technology realities. They explore the concept of "shadow OT," as well as the limits of traditional IDS deployments. They discuss why visibility is key to protectin…
…
continue reading
1
Joe Slowik on Identifying Truly 'Critical' Infrastructure
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly "critical," and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped. Slowik acknowledges that while calling everything "critical" ensures that nothing …
…
continue reading
1
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity. Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated …
…
continue reading
1
Danielle Jablanski on Critical Infrastructure Protection
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26Danielle Jablanski, Industrial Control Systems Strategist & Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government's role as a cybersecurity partner on implementation guidance and enablement. Danielle touches on a number of areas of CI security and protection, ranging …
…
continue reading
1
Cassie Crossley on Hardware Security, HBOMs
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20Schneider Electric Vice President of Supply Chain Security Cassie Crossley joins the Nexus Podcast to discuss the nuances of hardware security and the growing need for hardware bills of materials (HBOMs) within critical infrastructure. Cassie covers the use cases and features that matter most within an HBOM, some of the threats and weaknesses they …
…
continue reading
1
Stuxnet to Colonial Pipeline What Have We Learned & What’s on the Horizon?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Dino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. From his early fascination with hacking culture to leading OT security for one of the world’s largest engineering firms, Mike shares personal insights and lessons learne…
…
continue reading
1
Christiaan Beek on Ransomware's Evolution and Economics
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
…
continue reading
1
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Dino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized …
…
continue reading
1
Cyber Threats, China, and the Global Wake-Up Call
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Dino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have ne…
…
continue reading
1
Zero Trust in OT: A Look Back at Lessons Across IT and OT
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29In this special rewind episode, Dino Busalachi and Jim Cook address the messy but critical reality of implementing Zero Trust in operational technology (OT) environments. Drawing from years of hands-on experience, they break down why traditional IT frameworks often fail on the plant floor, especially when facing flat OT networks, legacy assets, and…
…
continue reading
1
Cybersecurity by Design: Building OT Security Into Your Manufacturing Plant Floor
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36In this episode, Dino and Craig address the practicalities of building cyber resilience directly into manufacturing environments - rather than after the fact. Using real-world analogies and field-tested insights, they break down why treating OT security like physical safety is crucial. They challenge the outdated mindset of retrofitting cybersecuri…
…
continue reading