Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Charles Blauner on the Changing Role of the CISO
|
May 20, 2024 |
Mikko Hypponen on a Decade of Corporate Ransomware Attacks
|
May 13, 2024 |
Adm. Michael Rogers on Geopolitics and Cybersecurity
|
May 09, 2024 |
Abel Archundia on Complexity in Critical Infrastructure
|
Apr 29, 2024 |
Adam Gluck on Industrial DevOps
|
Apr 23, 2024 |
Greg Garcia on the Change Healthcare Cyberattack
|
Apr 02, 2024 |
Ryan Pickren on New Web-Based PLC Malware Research
|
Mar 06, 2024 |
Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents
|
Feb 14, 2024 |
Team82 Answers More of your OT Cybersecurity Questions
|
Jan 25, 2024 |
Juan Piacquadio on Securing Pharma 4.0
|
Jan 10, 2024 |
David Elfering on CISOs and Cyber Liability Insurance
|
Jan 04, 2024 |
Team82 Answers Your Vulnerability Research Questions
|
Dec 06, 2023 |
Mandiant on Sandworm APT Attacks in Ukraine
|
Nov 10, 2023 |
Don Weber on Security Culture in Control Environments, STAR Methodology
|
Oct 26, 2023 |
MITRE on Caldera for OT
|
Oct 05, 2023 |
Jim LaBonty on the OT Security Stack
|
Sep 10, 2023 |
Stephen Reynolds on Protecting the CISO During Incident Investigations
|
Aug 28, 2023 |
Team82 on NAS Research, OPC UA Exploit Framework
|
Aug 20, 2023 |
Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk
|
Aug 13, 2023 |
Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector
|
Aug 03, 2023 |
Kathleen Moriarty on CIS' IoT Security Guidance
|
Jul 16, 2023 |
Walter Risi on the CISO's Journey from IT to OT
|
Jul 09, 2023 |
Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research
|
May 30, 2023 |
Charles Carmakal on Cybersecurity Threats to Healthcare
|
May 24, 2023 |
Lorrie Cranor on IoT Security and Privacy Labels
|
Apr 27, 2023 |
Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity
|
Apr 18, 2023 |
Dave Elfering on Cyber Liability Insurance
|
Apr 10, 2023 |
Vera Mens on Akuvox E11 Vulnerabilities
|
Mar 22, 2023 |
Adm. Mike Rogers on the National Cybersecurity Strategy
|
Mar 09, 2023 |
Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity
|
Feb 09, 2023 |
Noam Moshe on a Generic WAF Bypass Technique
|
Dec 19, 2022 |
Sharon Brizinov on Hacking IoT
|
Dec 12, 2022 |
Joe Slowik on TRITON Malware, XENOTIME Hacking Group
|
Oct 28, 2022 |
Inside Team82's EvilPLC Attack
|
Oct 20, 2022 |
Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List
|
Sep 30, 2022 |
Vergle Gipson on Cyber-Informed Engineering
|
Sep 28, 2022 |
Noam Moshe on the Evil PLC Attack
|
Aug 19, 2022 |
Dan Gunter on Threat Hunting in Industrial Control Systems
|
Jul 18, 2022 |
Dan Ricci on the ICS Advisory Project
|
Jul 06, 2022 |
Vera Mens on Hacking Flow Computers
|
Jun 30, 2022 |
Don C. Weber on ICS Cybersecurity Training, Education
|
Jun 15, 2022 |
Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)
|
Jun 02, 2022 |
Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework
|
May 26, 2022 |
Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools
|
May 04, 2022 |
Sharon Brizinov on Hacking and Securing PLCs
|
Apr 20, 2022 |
Kylie McClanahan on Automating the Gathering of Vulnerability Information
|
Mar 29, 2022 |
Sean Tufts on OT SOC Playbooks, Culture Challenges
|
Feb 24, 2022 |
Patrick Miller on Securing Critical Infrastructure in a Time of Conflict
|
Feb 17, 2022 |
OT-ISAC on Information-Sharing, Incident Recovery
|
Jan 30, 2022 |
Tom VanNorman on OT Cybersecurity Skills Gap
|
Jan 12, 2022 |
Claroty, JFrog on Fuzzing BusyBox
|
Nov 28, 2021 |
ZDI's Dustin Childs on Pwn2Own Miami
|
Nov 15, 2021 |
Exploring and Navigating OT for CISOs
|
Nov 10, 2021 |
Gary E. Miller on the GPSD Bug
|
Oct 27, 2021 |
Top 20 Secure PLC Coding Practices List
|
Sep 28, 2021 |
Dennis Fisher on 'When Bug Bounties Went Boom'
|
Sep 20, 2021 |
Tom Pace on SBOMs for ICS and OT
|
Aug 22, 2021 |
Tony Baker on OT Cybersecurity Challenges, CIP Security
|
Aug 10, 2021 |
Inside the Water Sector Cybersecurity Survey
|
Jul 02, 2021 |
Adm. Mike Rogers on Ransomware and OT
|
Jun 25, 2021 |
Mandiant on Low-Sophistication OT Attacks
|
Jun 08, 2021 |
E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity
|
May 18, 2021 |
Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress
|
Apr 29, 2021 |
Kaspersky, Claroty on OPC Security Research
|
Mar 30, 2021 |
Josh Grunzweig on Exchange Zero Days
|
Mar 17, 2021 |
Mauro Conti on Assessing the Use of Insecure ICS Protocols
|
Mar 10, 2021 |
Water ISAC on Oldsmar Hack, Sector Cybersecurity
|
Feb 22, 2021 |
Justin Searle on Pen-Testing ICS
|
Jan 21, 2021 |
Tom Tervoort on Zerologon
|
Dec 17, 2020 |
Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS
|
Nov 24, 2020 |
Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI
|
Nov 18, 2020 |
Introducing Aperture, A Claroty Podcast
|
Nov 16, 2020 |