Nexus: A Claroty Podcast

By Claroty

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Claroty

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 114

Description

Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. 


Episode Date
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
Nov 23, 2025
Christopher Frenz on Evidence-Based Security
Nov 16, 2025
Adm. Michael Rogers on Deterrence in Cyberspace
Oct 01, 2025
Bob Maley on Resource Challenges in Cybersecurity
Sep 14, 2025
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
Sep 01, 2025
Rui Ataide on Navigating Ransomware Negotiations
Aug 25, 2025
Salvatore Gariuolo on Safe EV Charging
Aug 17, 2025
Noam Moshe on Hacking Video Surveillance
Aug 07, 2025
Dan Berte on Solar Grid and IoT Vulnerabilities
Jul 28, 2025
Vivek Ponnada on the Ongoing Maturity of OT Security
Jul 21, 2025
Austin Allen on the Cybersecurity Realities Facing Healthcare
Jul 13, 2025
Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict
Jul 06, 2025
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
Jun 29, 2025
Steven Sim on OT-ISAC and the State of Information Sharing
Jun 23, 2025
Sarah Fluchs on the Cyber Resilience Act
Jun 17, 2025
Andrew Ohrt on Cyber-Informed Engineering
Jun 03, 2025
Megan Stifel on the Impact of the Ransomware Task Force
May 28, 2025
Joe Slowik on Identifying Truly 'Critical' Infrastructure
May 18, 2025
Danielle Jablanski on Critical Infrastructure Protection
May 11, 2025
Cassie Crossley on Hardware Security, HBOMs
May 07, 2025
Christiaan Beek on Ransomware's Evolution and Economics
Apr 30, 2025
Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard
Mar 30, 2025
Mike Holcomb on Starting and Succeeding in OT Cybersecurity
Mar 19, 2025
Ron Fabela on Low-Skilled OT and ICS Threat Actors
Feb 24, 2025
Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents
Feb 17, 2025
Brian Foster on the Risks of a Hyperconnected Grid
Feb 11, 2025
CISA's Matthew Rogers on Secure by Demand for OT
Jan 19, 2025
Noam Moshe on the IOCONTROL Malware
Dec 19, 2024
Team82 on Attacking the Insecure IoT Cloud
Dec 13, 2024
Volexity's Steven Adair on the Nearest Neighbor Attack
Dec 09, 2024
Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure
Nov 07, 2024
Grant Geyer on the Business Impact of Disruptions from Cyberattacks
Oct 28, 2024
Alethe Denis on Social Engineering, Red-Teaming
Aug 26, 2024
Alon Dankner on Extracting Crypto Keys from PLCs
Aug 19, 2024
Noam Moshe on Extracting Forensic Data from Unitronics PLCs
Aug 08, 2024
Alexander Antukh on Cyber Risk Quantification
Aug 01, 2024
Vincente Diaz on Using AI for Malware Analysis
Jul 21, 2024
Ahmik Hindman on Patching OT and ICS
Jul 08, 2024
Dr. Bilyana Lilly on Information Warfare
Jul 01, 2024
Vinnie Liu on Offensive Security Testing During Incidents
Jun 10, 2024
Diana Kelley on Protecting the AI Lifecycle
Jun 03, 2024
Jennifer Minella on OT Cybersecurity Convergence
May 28, 2024
Charles Blauner on the Changing Role of the CISO
May 20, 2024
Mikko Hypponen on a Decade of Corporate Ransomware Attacks
May 13, 2024
Adm. Michael Rogers on Geopolitics and Cybersecurity
May 09, 2024
Abel Archundia on Complexity in Critical Infrastructure
Apr 29, 2024
Adam Gluck on Industrial DevOps
Apr 23, 2024
Greg Garcia on the Change Healthcare Cyberattack
Apr 02, 2024
Ryan Pickren on New Web-Based PLC Malware Research
Mar 06, 2024
Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents
Feb 14, 2024
Team82 Answers More of your OT Cybersecurity Questions
Jan 25, 2024
Juan Piacquadio on Securing Pharma 4.0
Jan 10, 2024
David Elfering on CISOs and Cyber Liability Insurance
Jan 04, 2024
Team82 Answers Your Vulnerability Research Questions
Dec 06, 2023
Mandiant on Sandworm APT Attacks in Ukraine
Nov 10, 2023
Don Weber on Security Culture in Control Environments, STAR Methodology
Oct 26, 2023
MITRE on Caldera for OT
Oct 05, 2023
Jim LaBonty on the OT Security Stack
Sep 10, 2023
Stephen Reynolds on Protecting the CISO During Incident Investigations
Aug 28, 2023
Team82 on NAS Research, OPC UA Exploit Framework
Aug 20, 2023
Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk
Aug 13, 2023
Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector
Aug 03, 2023
Kathleen Moriarty on CIS' IoT Security Guidance
Jul 16, 2023
Walter Risi on the CISO's Journey from IT to OT
Jul 09, 2023
Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research
May 30, 2023
Charles Carmakal on Cybersecurity Threats to Healthcare
May 24, 2023
Lorrie Cranor on IoT Security and Privacy Labels
Apr 27, 2023
Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity
Apr 18, 2023
Dave Elfering on Cyber Liability Insurance
Apr 10, 2023
Vera Mens on Akuvox E11 Vulnerabilities
Mar 22, 2023
Adm. Mike Rogers on the National Cybersecurity Strategy
Mar 09, 2023
Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity
Feb 09, 2023
Noam Moshe on a Generic WAF Bypass Technique
Dec 19, 2022
Sharon Brizinov on Hacking IoT
Dec 12, 2022
Joe Slowik on TRITON Malware, XENOTIME Hacking Group
Oct 28, 2022
Inside Team82's EvilPLC Attack
Oct 20, 2022
Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List
Sep 30, 2022
Vergle Gipson on Cyber-Informed Engineering
Sep 28, 2022
Noam Moshe on the Evil PLC Attack
Aug 19, 2022
Dan Gunter on Threat Hunting in Industrial Control Systems
Jul 18, 2022
Dan Ricci on the ICS Advisory Project
Jul 06, 2022
Vera Mens on Hacking Flow Computers
Jun 30, 2022
Don C. Weber on ICS Cybersecurity Training, Education
Jun 15, 2022
Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)
Jun 02, 2022
Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework
May 26, 2022
Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools
May 04, 2022
Sharon Brizinov on Hacking and Securing PLCs
Apr 20, 2022
Kylie McClanahan on Automating the Gathering of Vulnerability Information
Mar 29, 2022
Sean Tufts on OT SOC Playbooks, Culture Challenges
Feb 24, 2022
Patrick Miller on Securing Critical Infrastructure in a Time of Conflict
Feb 17, 2022
OT-ISAC on Information-Sharing, Incident Recovery
Jan 30, 2022
Tom VanNorman on OT Cybersecurity Skills Gap
Jan 12, 2022
Claroty, JFrog on Fuzzing BusyBox
Nov 28, 2021
ZDI's Dustin Childs on Pwn2Own Miami
Nov 15, 2021
Exploring and Navigating OT for CISOs
Nov 10, 2021
Gary E. Miller on the GPSD Bug
Oct 27, 2021
Top 20 Secure PLC Coding Practices List
Sep 28, 2021
Dennis Fisher on 'When Bug Bounties Went Boom'
Sep 20, 2021
Tom Pace on SBOMs for ICS and OT
Aug 22, 2021
Tony Baker on OT Cybersecurity Challenges, CIP Security
Aug 10, 2021
Inside the Water Sector Cybersecurity Survey
Jul 02, 2021
Adm. Mike Rogers on Ransomware and OT
Jun 25, 2021
Mandiant on Low-Sophistication OT Attacks
Jun 08, 2021
E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity
May 18, 2021
Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress
Apr 29, 2021
Kaspersky, Claroty on OPC Security Research
Mar 30, 2021
Josh Grunzweig on Exchange Zero Days
Mar 17, 2021
Mauro Conti on Assessing the Use of Insecure ICS Protocols
Mar 10, 2021
Water ISAC on Oldsmar Hack, Sector Cybersecurity
Feb 22, 2021
Justin Searle on Pen-Testing ICS
Jan 21, 2021
Tom Tervoort on Zerologon
Dec 17, 2020
Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS
Nov 24, 2020
Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI
Nov 18, 2020
Introducing Aperture, A Claroty Podcast
Nov 16, 2020