Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/82/aa/3e/82aa3e9e-d507-d1b3-5bca-6ccccf8cc261/mza_4957908269677954171.jpg/600x600bb.jpg
The OT and IoT Security Podcast
Nozomi Networks
49 episodes
9 months ago
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...
Show more...
Technology
RSS
All content for The OT and IoT Security Podcast is the property of Nozomi Networks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...
Show more...
Technology
Episodes (20/49)
The OT and IoT Security Podcast
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...
Show more...
11 months ago
29 minutes

The OT and IoT Security Podcast
The Security Sandbox at the ICS Cybersecurity Conference
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months✅ Evolving strategies for integrating IT and OT cybersecurity✅ The future role of AI in ICS cybersecurity✅ Fostering collaboration between IT and OT teamsVisit Our WebsiteFollow Us on LinkedIn
Show more...
1 year ago
19 minutes

The OT and IoT Security Podcast
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard cri...
Show more...
1 year ago
32 minutes

The OT and IoT Security Podcast
The Security Sandbox | Modernizing Cyber Risk Management in OT
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply the latest tools, trends and techniques to reduce cyber risk and enhance the resilience of your OT systems.We’ll cover:Different risk scoring appro...
Show more...
1 year ago
31 minutes

The OT and IoT Security Podcast
The Security Sandbox | Evolving Endpoint Security in OT
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and eve...
Show more...
1 year ago
31 minutes

The OT and IoT Security Podcast
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is on to outsmart bad actors who are already using new forms of AI to find vulnerabilities faster and launch more effective attacks. During this sessio...
Show more...
1 year ago
32 minutes

The OT and IoT Security Podcast
What is Incident Response? | Nozomi Networks
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incident does occur.Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and OT Cybersecurity Strategist Danielle Jablanski.V...
Show more...
2 years ago
42 minutes

The OT and IoT Security Podcast
What is Threat Detection? | Nozomi Networks
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further.Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Security Research Evangelist Roya Gordon.Visit Our WebsiteFollow Us on LinkedIn
Show more...
2 years ago
37 minutes

The OT and IoT Security Podcast
What is Cyber Risk Management? | Nozomi Networks
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps.Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou.Visit Our WebsiteFollow Us on LinkedIn
Show more...
2 years ago
37 minutes

The OT and IoT Security Podcast
What is Zero Trust Security? I Nozomi Networks
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design approach.Learn more from Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Gary Kinghorn, Senior Director of Product Marketing.Visit ...
Show more...
2 years ago
22 minutes

The OT and IoT Security Podcast
A Day in the Life of an OT Responder
Response time refers to the amount of time that takes place between when we perceive something to when we respond to it. It is the ability to detect, process, and respond to a situation. In this case, we look at what a typical day an Operational Technology (OT) responder must endure and why this role is crucial within critical infrastructure and industrial control networks.Visit Our WebsiteFollow Us on LinkedIn
Show more...
3 years ago
1 hour 1 minute

The OT and IoT Security Podcast
Cyber and Operational Resilience for Smart Factories
Find out how increased cyber risk, threat of downtime, legacy equipment and IoT proliferation are contributing to the resilience challenge.Visit Our WebsiteFollow Us on LinkedIn
Show more...
3 years ago
1 hour

The OT and IoT Security Podcast
OT Network Security Challenges in Enterprise Environments
Learn how the Ukraine Russia conflict has enlivened nation sponsored and cyber terrorism events and what defines their motivation. Visit Our WebsiteFollow Us on LinkedIn
Show more...
3 years ago
1 hour 2 minutes

The OT and IoT Security Podcast
Monitoring & Protecting Assets in Critical Infrastructure
Join our esteemed panel of experts who cover ways to advance cyber security strategies for critical infrastructure by monitoring and protecting your assets.Visit Our WebsiteFollow Us on LinkedIn
Show more...
3 years ago
1 hour 3 minutes

The OT and IoT Security Podcast
In a World of Unsecure IoT - Is Privacy Dead?
Will the rapidly expanding use of IoT devices, advent of smart cities and creation of an uber-connected world hasten the demise of privacy? In such a world, just how important is privacy, data security and protecting our IoT infrastructure? Learn about the complex issues of privacy and privilege in this episode. Visit Our WebsiteFollow Us on LinkedIn
Show more...
3 years ago
1 hour 2 minutes

The OT and IoT Security Podcast
Understanding the Risks to Operational Technology (OT)
Operational technology (OT) and Information Technology (IT) have traditionally been managed separately. With the emergence of Internet of Things (IoT) and the changing threat and risk landscape, industrial, manufacturing and critical infrastructure companies are bringing together their OT, IT and IoT networks to achieve a combined cyber and risk plan to prevent future cyberattacks. The incoming Critical Infrastructure Bill is aimed at driving action in this direction and organizat...
Show more...
4 years ago
1 hour

The OT and IoT Security Podcast
Defending Smart Cities from Cyber Threats
Join us as we embark upon a journey to secure our digital cities, including foundational technologies as CCTV’s. CCTV’s are used in local government, utilities, transportation systems, healthcare… the list goes on. Visit Our WebsiteFollow Us on LinkedIn
Show more...
4 years ago
1 hour

The OT and IoT Security Podcast
Threat Actors Never Sleep – And They’re Creating Nightmares For the Security Community
PrintNightmare and the Kaseya ransomware attack are two recent cyber incidents making waves in the news about the escalating threat environment. Nozomi Networks Labs security researcher Ivan Speziale shares his insights into what went wrong in these attacks, and what can be done to mitigate their impact. Visit Our WebsiteFollow Us on LinkedIn
Show more...
4 years ago
18 minutes

The OT and IoT Security Podcast
How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country. Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now? Join with us as we explore:The steps inv...
Show more...
4 years ago
1 hour 1 minute

The OT and IoT Security Podcast
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this. Visit Our WebsiteFollow Us on LinkedIn
Show more...
4 years ago
5 minutes

The OT and IoT Security Podcast
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity ...