Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
| Episode | Date |
|---|---|
|
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
|
Dec 04, 2024 |
|
The Security Sandbox at the ICS Cybersecurity Conference
|
Nov 01, 2024 |
|
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
|
Sep 26, 2024 |
|
The Security Sandbox | Modernizing Cyber Risk Management in OT
|
Aug 28, 2024 |
|
The Security Sandbox | Evolving Endpoint Security in OT
|
Jul 31, 2024 |
|
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
|
Jul 09, 2024 |
|
What is Incident Response? | Nozomi Networks
|
Dec 29, 2022 |
|
What is Threat Detection? | Nozomi Networks
|
Dec 28, 2022 |
|
What is Zero Trust Security? I Nozomi Networks
|
Dec 28, 2022 |
|
What is Cyber Risk Management? | Nozomi Networks
|
Dec 28, 2022 |
|
A Day in the Life of an OT Responder
|
Jun 09, 2022 |
|
Cyber and Operational Resilience for Smart Factories
|
May 18, 2022 |
|
OT Network Security Challenges in Enterprise Environments
|
May 12, 2022 |
|
Monitoring & Protecting Assets in Critical Infrastructure
|
Mar 08, 2022 |
|
In a World of Unsecure IoT - Is Privacy Dead?
|
Nov 19, 2021 |
|
Understanding the Risks to Operational Technology (OT)
|
Oct 09, 2021 |
|
Defending Smart Cities from Cyber Threats
|
Aug 20, 2021 |
|
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
|
Jul 08, 2021 |
|
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
|
May 28, 2021 |
|
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
|
Apr 14, 2021 |
|
Improving Transportation System Operational Visibility and Security
|
Mar 17, 2021 |
|
Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
|
Mar 16, 2021 |
|
Dissecting the Security Implications of the Australian Critical Infrastructure Act
|
Mar 04, 2021 |
|
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity
|
Dec 04, 2020 |
|
Serious Workplace Accidents and Their Connection to Cybersecurity
|
Dec 01, 2020 |
|
Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars
|
Nov 10, 2020 |
|
Ngoc Phan – Managing Business During Times of Turmoil
|
Nov 05, 2020 |
|
P2P Botnets: Following the Network Trail
|
Nov 04, 2020 |
|
Stephen Driggers – How the Customer Experience Leads to a Better OT Security Solution
|
Oct 21, 2020 |
|
Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
|
Oct 14, 2020 |
|
Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?
|
Oct 06, 2020 |
|
Edgard Capdevielle – From Startup to Industry Leader
|
Sep 29, 2020 |
|
Moreno Carullo – Using Artificial Intelligence and Machine Learning in Cybersecurity
|
Sep 16, 2020 |
|
Cyber Crime Migration to Critical Infrastructure
|
Sep 10, 2020 |
|
How to Use the MITRE ATT&CK Framework
|
Sep 09, 2020 |
|
Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution
|
Aug 27, 2020 |
|
Alessandro Di Pinto – A Day in the Life of a Threat Analyst
|
Aug 18, 2020 |
|
Alan Berusch - The Role of Culture in Company Success
|
Aug 12, 2020 |
|
OT/IoT Security Report 2020
|
Aug 06, 2020 |
|
Chet Namboodri – The Power of Partnerships: Taking OT Cybersecurity to the Next Level
|
Jul 27, 2020 |
|
Kim Legelis – What’s Being Done to Protect Us from the Bad Guys
|
Jul 17, 2020 |
|
Improving SOC Efficiency
|
Jul 08, 2020 |
|
Smart Grids: Securing Encrypted Communications
|
Jun 11, 2020 |
|
The IoT Botnet Threat: What It Is and How to Deal with It
|
May 28, 2020 |
|
Viruses Are Disrupting Our Supply Chains - Where Do The Biggest Vulnerabilities Lie?
|
May 14, 2020 |
|
Andrea Carcano: Getting to Know an OT Security Entrepreneur
|
May 05, 2020 |
|
Suzanne Spaulding: Dealing with OT & IoT Security in the COVID-19 Era
|
Apr 24, 2020 |
|
Remote Access Monitoring: What To Watch Out For During the COVID-19 Pandemic
|
Apr 16, 2020 |
|
The Emerging Threat Intel Landscape: How Hackers Are Using COVID-19
|
Apr 09, 2020 |