The OT and IoT Security Podcast
Activity Overview
Episode publication activity over the past year
Episodes
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
04 Dec 2024
Contributed by Lukas
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss...
The Security Sandbox at the ICS Cybersecurity Conference
01 Nov 2024
Contributed by Lukas
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months✅ ...
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
26 Sep 2024
Contributed by Lukas
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportuniti...
The Security Sandbox | Modernizing Cyber Risk Management in OT
28 Aug 2024
Contributed by Lukas
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cy...
The Security Sandbox | Evolving Endpoint Security in OT
31 Jul 2024
Contributed by Lukas
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption...
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
09 Jul 2024
Contributed by Lukas
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-p...
What is Incident Response? | Nozomi Networks
29 Dec 2022
Contributed by Lukas
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infras...
What is Threat Detection? | Nozomi Networks
28 Dec 2022
Contributed by Lukas
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understandi...
What is Cyber Risk Management? | Nozomi Networks
28 Dec 2022
Contributed by Lukas
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk ...
What is Zero Trust Security? I Nozomi Networks
28 Dec 2022
Contributed by Lukas
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete....
A Day in the Life of an OT Responder
09 Jun 2022
Contributed by Lukas
Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, ...
Cyber and Operational Resilience for Smart Factories
18 May 2022
Contributed by Lukas
Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge.Visit Our W...
OT Network Security Challenges in Enterprise Environments
12 May 2022
Contributed by Lukas
Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation. Visit Our WebsiteF...
Monitoring & Protecting Assets in Critical Infrastructure
08 Mar 2022
Contributed by Lukas
Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your a...
In a World of Unsecure IoT - Is Privacy Dead?
19 Nov 2021
Contributed by Lukas
Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a ...
Understanding the Risks to Operational Technology (OT)
09 Oct 2021
Contributed by Lukas
Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (Io...
Defending Smart Cities from Cyber Threats
20 Aug 2021
Contributed by Lukas
Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local governme...
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
08 Jul 2021
Contributed by Lukas
PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Noz...
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
28 May 2021
Contributed by Lukas
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative...
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
14 Apr 2021
Contributed by Lukas
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras ...
Improving Transportation System Operational Visibility and Security
17 Mar 2021
Contributed by Lukas
The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network compl...
Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
16 Mar 2021
Contributed by Lukas
To help you address accelerating OT/IoT security issues, the Nozomi Networks Labs team shares their new research findings on the top threats targeting...
Dissecting the Security Implications of the Australian Critical Infrastructure Act
04 Mar 2021
Contributed by Lukas
What makes the Australian Critical Infrastructure Act one of the most important pieces of security legislation to come out in the last decade? Join B...
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity
04 Dec 2020
Contributed by Lukas
Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness abo...
Serious Workplace Accidents and Their Connection to Cybersecurity
01 Dec 2020
Contributed by Lukas
An increase in cyberthreats across IT, OT and IoT networks, combined with new labor safety laws designed to hold executive leadership or executive lea...
Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars
10 Nov 2020
Contributed by Lukas
Former General Motors CISO Rich Armour reflects on how digital transformation and cybersecurity are driving the next generation of smart, connected an...
Ngoc Phan – Managing Business During Times of Turmoil
05 Nov 2020
Contributed by Lukas
Businesses have faced extremely difficult times during the COVID-19 pandemic. Hear what Nozomi Networks Vice President of Finance Ngoc Phan is doing t...
P2P Botnets: Following the Network Trail
04 Nov 2020
Contributed by Lukas
To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with sp...
Stephen Driggers – How the Customer Experience Leads to a Better OT Security Solution
21 Oct 2020
Contributed by Lukas
Learn why Stephen, Nozomi Networks’ Chief Revenue Officer, believes in creating an amazing customer experience at every touch point. He shares how l...
Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
14 Oct 2020
Contributed by Lukas
In this episode, learn how digital transformation has been fuelled by a global pandemic that forced many of us to work from home. Security visionaries...
Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?
06 Oct 2020
Contributed by Lukas
As you move some or all of your data and applications from on-prem to the cloud, you may need to rethink your security strategy. This episode covers c...
Edgard Capdevielle – From Startup to Industry Leader
29 Sep 2020
Contributed by Lukas
Hear from Nozomi Networks’ President and CEO Edgard Capdevielle how the company transformed from a startup of seven people in the U.S. and Switzerla...
Moreno Carullo – Using Artificial Intelligence and Machine Learning in Cybersecurity
16 Sep 2020
Contributed by Lukas
Learn why Moreno Carullo launched Nozomi Networks with university-mate Andrea Carcano in 2013, and how artificial intelligence and machine learning ar...
Cyber Crime Migration to Critical Infrastructure
10 Sep 2020
Contributed by Lukas
In this episode, find out what every critical infrastructure and industrial operation should know to keep operations safe. Learn about cyber espionage...
How to Use the MITRE ATT&CK Framework
09 Sep 2020
Contributed by Lukas
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses t...
Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution
27 Aug 2020
Contributed by Lukas
Learn about the pitfalls typically encountered when choosing an OT/IoT cybersecurity solution. From evaluation to selection, purchase, and deployment,...
Alessandro Di Pinto – A Day in the Life of a Threat Analyst
18 Aug 2020
Contributed by Lukas
Learn about Alessandro’s path from pen tester to threat analyst, and what a threat analyst does day-to-day. Find out more about the activities that ...
Alan Berusch - The Role of Culture in Company Success
12 Aug 2020
Contributed by Lukas
This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain...
OT/IoT Security Report 2020
06 Aug 2020
Contributed by Lukas
This episode covers the most active threats seen in the first six months of 2020, including IoT malware, ransomware, and COVID-19-themed malware. Gain...
Chet Namboodri – The Power of Partnerships: Taking OT Cybersecurity to the Next Level
27 Jul 2020
Contributed by Lukas
As Nozomi Networks VP of Worldwide Business Development and Channel Sales, Chet Namboodri knows the value of partnerships. Learn how partnering betwee...
Kim Legelis – What’s Being Done to Protect Us from the Bad Guys
17 Jul 2020
Contributed by Lukas
Find out what led Nozomi Networks CMO Kim Legelis to cybersecurity, and who the bad guys are in the current OT/IoT security landscape. Learn what secu...
Improving SOC Efficiency
08 Jul 2020
Contributed by Lukas
How should Security Operations Center (SOC) analysts face the often-overwhelming number of alerts triggered by ICS and IoT systems? Find out why alert...
Smart Grids: Securing Encrypted Communications
11 Jun 2020
Contributed by Lukas
In this episode, learn about how vendors are implementing encrypted OT protocols into real-world device firmware, and the security implications of enc...
The IoT Botnet Threat: What It Is and How to Deal with It
28 May 2020
Contributed by Lukas
Learn about IoT botnet threats from Nozomi Networks security researchers, including common propagation techniques, hacktivism, and strategies to prote...
Viruses Are Disrupting Our Supply Chains - Where Do The Biggest Vulnerabilities Lie?
14 May 2020
Contributed by Lukas
COVID-19 has disrupted supply chains across the world. But disruptions to the manufacturing supply chain are surprisingly common, due to equipment fai...
Andrea Carcano: Getting to Know an OT Security Entrepreneur
05 May 2020
Contributed by Lukas
What kind of person and what kind of effort does it take to become an OT security entrepreneur? Host Chris Grove interviews founder Andrea Carcano to ...
Suzanne Spaulding: Dealing with OT & IoT Security in the COVID-19 Era
24 Apr 2020
Contributed by Lukas
Suzanne Spaulding, former DHS Undersecretary for Cybersecurity, provides interesting insights into nation-state threats during COVID-19, the Solarium ...
Remote Access Monitoring: What To Watch Out For During the COVID-19 Pandemic
16 Apr 2020
Contributed by Lukas
Working from home is now the norm for millions of people, including those maintaining safe industrial operational processes. Join host Andrea Carcano ...
The Emerging Threat Intel Landscape: How Hackers Are Using COVID-19
09 Apr 2020
Contributed by Lukas
Andrea Carcano talks with colleagues Alexander Di Pinto and Chris Grove about the evolving COVID-19 threat landscape. Their discussion covers how thre...