34 episodes

Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.

The OT and IoT Security Podcast Nozomi Networks

    • Technology
    • 5.0 • 3 Ratings

Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.

    Understanding the Risks to Operational Technology (OT)

    Understanding the Risks to Operational Technology (OT)

     Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk plan to prevent future cyberattacks.  The incoming Critical Infrastructure Bill is aimed at driving action in this direction and organizations must start to prepare now to secure their IT as well their OT / IoT infrastructure.  

    These combined capabilities not only achieve significant improvements in cybersecurity but bring remarkable improvements in the efficiency of managing and securing your diverse assets.  

    In this episode, learn more about: 
    Threats to OTUnified visibility and security Eliminating OT and IT silos Reducing risks to OT, IT and IoT

    • 1 hr
    Defending Smart Cities from Cyber Threats

    Defending Smart Cities from Cyber Threats

    Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. 

    • 1 hr
    Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community

    Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community

    PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment.  Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. 

    • 18 min
    How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program

    How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program

    U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. 
    Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now? 
    Join with us as we explore:
    The steps involved in building out a Risk & Compliance Program Effective design, implementation and response componentsBuilding a quality ecosystem that supports identifying, managing and mitigating risksGathering intelligence for making evidence-based decisions Ensuring your time and effort leads to a quality outcome

    • 1 hr 1 min
    The Verkada IoT Security Camera Attack – How Did Hackers Get In?

    The Verkada IoT Security Camera Attack – How Did Hackers Get In?

    IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.

     

    • 5 min
    Improving Transportation System Operational Visibility and Security

    Improving Transportation System Operational Visibility and Security

    The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper operational visibility, prevent downtime and detect cyber threats. 

    • 56 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

Top Podcasts In Technology

You Might Also Like