Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
| Episode | Date |
|---|---|
|
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
|
Nov 23, 2025 |
|
Christopher Frenz on Evidence-Based Security
|
Nov 16, 2025 |
|
Adm. Michael Rogers on Deterrence in Cyberspace
|
Oct 01, 2025 |
|
Bob Maley on Resource Challenges in Cybersecurity
|
Sep 14, 2025 |
|
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
|
Sep 01, 2025 |
|
Rui Ataide on Navigating Ransomware Negotiations
|
Aug 25, 2025 |
|
Salvatore Gariuolo on Safe EV Charging
|
Aug 17, 2025 |
|
Noam Moshe on Hacking Video Surveillance
|
Aug 07, 2025 |
|
Dan Berte on Solar Grid and IoT Vulnerabilities
|
Jul 28, 2025 |
|
Vivek Ponnada on the Ongoing Maturity of OT Security
|
Jul 21, 2025 |
|
Austin Allen on the Cybersecurity Realities Facing Healthcare
|
Jul 13, 2025 |
|
Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict
|
Jul 06, 2025 |
|
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
|
Jun 29, 2025 |
|
Steven Sim on OT-ISAC and the State of Information Sharing
|
Jun 23, 2025 |
|
Sarah Fluchs on the Cyber Resilience Act
|
Jun 17, 2025 |
|
Andrew Ohrt on Cyber-Informed Engineering
|
Jun 03, 2025 |
|
Megan Stifel on the Impact of the Ransomware Task Force
|
May 28, 2025 |
|
Joe Slowik on Identifying Truly 'Critical' Infrastructure
|
May 18, 2025 |
|
Danielle Jablanski on Critical Infrastructure Protection
|
May 11, 2025 |
|
Cassie Crossley on Hardware Security, HBOMs
|
May 07, 2025 |
|
Christiaan Beek on Ransomware's Evolution and Economics
|
Apr 30, 2025 |
|
Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard
|
Mar 30, 2025 |
|
Mike Holcomb on Starting and Succeeding in OT Cybersecurity
|
Mar 19, 2025 |
|
Ron Fabela on Low-Skilled OT and ICS Threat Actors
|
Feb 24, 2025 |
|
Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents
|
Feb 17, 2025 |
|
Brian Foster on the Risks of a Hyperconnected Grid
|
Feb 11, 2025 |
|
CISA's Matthew Rogers on Secure by Demand for OT
|
Jan 19, 2025 |
|
Noam Moshe on the IOCONTROL Malware
|
Dec 19, 2024 |
|
Team82 on Attacking the Insecure IoT Cloud
|
Dec 13, 2024 |
|
Volexity's Steven Adair on the Nearest Neighbor Attack
|
Dec 09, 2024 |
|
Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure
|
Nov 07, 2024 |
|
Grant Geyer on the Business Impact of Disruptions from Cyberattacks
|
Oct 28, 2024 |
|
Alethe Denis on Social Engineering, Red-Teaming
|
Aug 26, 2024 |
|
Alon Dankner on Extracting Crypto Keys from PLCs
|
Aug 19, 2024 |
|
Noam Moshe on Extracting Forensic Data from Unitronics PLCs
|
Aug 08, 2024 |
|
Alexander Antukh on Cyber Risk Quantification
|
Aug 01, 2024 |
|
Vincente Diaz on Using AI for Malware Analysis
|
Jul 21, 2024 |
|
Ahmik Hindman on Patching OT and ICS
|
Jul 08, 2024 |
|
Dr. Bilyana Lilly on Information Warfare
|
Jul 01, 2024 |
|
Vinnie Liu on Offensive Security Testing During Incidents
|
Jun 10, 2024 |
|
Diana Kelley on Protecting the AI Lifecycle
|
Jun 03, 2024 |
|
Jennifer Minella on OT Cybersecurity Convergence
|
May 28, 2024 |
|
Charles Blauner on the Changing Role of the CISO
|
May 20, 2024 |
|
Mikko Hypponen on a Decade of Corporate Ransomware Attacks
|
May 13, 2024 |
|
Adm. Michael Rogers on Geopolitics and Cybersecurity
|
May 09, 2024 |
|
Abel Archundia on Complexity in Critical Infrastructure
|
Apr 29, 2024 |
|
Adam Gluck on Industrial DevOps
|
Apr 23, 2024 |
|
Greg Garcia on the Change Healthcare Cyberattack
|
Apr 02, 2024 |
|
Ryan Pickren on New Web-Based PLC Malware Research
|
Mar 06, 2024 |
|
Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents
|
Feb 14, 2024 |
|
Team82 Answers More of your OT Cybersecurity Questions
|
Jan 25, 2024 |
|
Juan Piacquadio on Securing Pharma 4.0
|
Jan 10, 2024 |
|
David Elfering on CISOs and Cyber Liability Insurance
|
Jan 04, 2024 |
|
Team82 Answers Your Vulnerability Research Questions
|
Dec 06, 2023 |
|
Mandiant on Sandworm APT Attacks in Ukraine
|
Nov 10, 2023 |
|
Don Weber on Security Culture in Control Environments, STAR Methodology
|
Oct 26, 2023 |
|
MITRE on Caldera for OT
|
Oct 05, 2023 |
|
Jim LaBonty on the OT Security Stack
|
Sep 10, 2023 |
|
Stephen Reynolds on Protecting the CISO During Incident Investigations
|
Aug 28, 2023 |
|
Team82 on NAS Research, OPC UA Exploit Framework
|
Aug 20, 2023 |
|
Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk
|
Aug 13, 2023 |
|
Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector
|
Aug 03, 2023 |
|
Kathleen Moriarty on CIS' IoT Security Guidance
|
Jul 16, 2023 |
|
Walter Risi on the CISO's Journey from IT to OT
|
Jul 09, 2023 |
|
Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research
|
May 30, 2023 |
|
Charles Carmakal on Cybersecurity Threats to Healthcare
|
May 24, 2023 |
|
Lorrie Cranor on IoT Security and Privacy Labels
|
Apr 27, 2023 |
|
Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity
|
Apr 18, 2023 |
|
Dave Elfering on Cyber Liability Insurance
|
Apr 10, 2023 |
|
Vera Mens on Akuvox E11 Vulnerabilities
|
Mar 22, 2023 |
|
Adm. Mike Rogers on the National Cybersecurity Strategy
|
Mar 09, 2023 |
|
Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity
|
Feb 09, 2023 |
|
Noam Moshe on a Generic WAF Bypass Technique
|
Dec 19, 2022 |
|
Sharon Brizinov on Hacking IoT
|
Dec 12, 2022 |
|
Joe Slowik on TRITON Malware, XENOTIME Hacking Group
|
Oct 28, 2022 |
|
Inside Team82's EvilPLC Attack
|
Oct 20, 2022 |
|
Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List
|
Sep 30, 2022 |
|
Vergle Gipson on Cyber-Informed Engineering
|
Sep 28, 2022 |
|
Noam Moshe on the Evil PLC Attack
|
Aug 19, 2022 |
|
Dan Gunter on Threat Hunting in Industrial Control Systems
|
Jul 18, 2022 |
|
Dan Ricci on the ICS Advisory Project
|
Jul 06, 2022 |
|
Vera Mens on Hacking Flow Computers
|
Jun 30, 2022 |
|
Don C. Weber on ICS Cybersecurity Training, Education
|
Jun 15, 2022 |
|
Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)
|
Jun 02, 2022 |
|
Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework
|
May 26, 2022 |
|
Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools
|
May 04, 2022 |
|
Sharon Brizinov on Hacking and Securing PLCs
|
Apr 20, 2022 |
|
Kylie McClanahan on Automating the Gathering of Vulnerability Information
|
Mar 29, 2022 |
|
Sean Tufts on OT SOC Playbooks, Culture Challenges
|
Feb 24, 2022 |
|
Patrick Miller on Securing Critical Infrastructure in a Time of Conflict
|
Feb 17, 2022 |
|
OT-ISAC on Information-Sharing, Incident Recovery
|
Jan 30, 2022 |
|
Tom VanNorman on OT Cybersecurity Skills Gap
|
Jan 12, 2022 |
|
Claroty, JFrog on Fuzzing BusyBox
|
Nov 28, 2021 |
|
ZDI's Dustin Childs on Pwn2Own Miami
|
Nov 15, 2021 |
|
Exploring and Navigating OT for CISOs
|
Nov 10, 2021 |
|
Gary E. Miller on the GPSD Bug
|
Oct 27, 2021 |
|
Top 20 Secure PLC Coding Practices List
|
Sep 28, 2021 |
|
Dennis Fisher on 'When Bug Bounties Went Boom'
|
Sep 20, 2021 |
|
Tom Pace on SBOMs for ICS and OT
|
Aug 22, 2021 |
|
Tony Baker on OT Cybersecurity Challenges, CIP Security
|
Aug 10, 2021 |
|
Inside the Water Sector Cybersecurity Survey
|
Jul 02, 2021 |
|
Adm. Mike Rogers on Ransomware and OT
|
Jun 25, 2021 |
|
Mandiant on Low-Sophistication OT Attacks
|
Jun 08, 2021 |
|
E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity
|
May 18, 2021 |
|
Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress
|
Apr 29, 2021 |
|
Kaspersky, Claroty on OPC Security Research
|
Mar 30, 2021 |
|
Josh Grunzweig on Exchange Zero Days
|
Mar 17, 2021 |
|
Mauro Conti on Assessing the Use of Insecure ICS Protocols
|
Mar 10, 2021 |
|
Water ISAC on Oldsmar Hack, Sector Cybersecurity
|
Feb 22, 2021 |
|
Justin Searle on Pen-Testing ICS
|
Jan 21, 2021 |
|
Tom Tervoort on Zerologon
|
Dec 17, 2020 |
|
Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS
|
Nov 24, 2020 |
|
Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI
|
Nov 18, 2020 |
|
Introducing Aperture, A Claroty Podcast
|
Nov 16, 2020 |