<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/1475533.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Nexus: A Claroty Podcast</title>

  <lastBuildDate>Mon, 09 Mar 2026 16:13:22 -0400</lastBuildDate>
  <link>https://nexusconnect.io/podcasts</link>
  <language>en-us</language>
  <copyright>© 2026 Nexus: A Claroty Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>c70e4a03-6cf6-5d48-b6ae-d9c12aad8f6d</podcast:guid>
  <podcast:txt purpose="verify">michael.m@claroty.com</podcast:txt>
  <itunes:author>Claroty</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.&nbsp;</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>cyber-physical systems security, cybersecurity, IoT, OT, IoMT</itunes:keywords>
  <itunes:owner>
    <itunes:name>Claroty</itunes:name>
    <itunes:email>michael.m@claroty.com</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/rpoywc2ggqpyzj0h09x3go6o7os3?.jpg</url>
     <title>Nexus: A Claroty Podcast</title>
     <link>https://nexusconnect.io/podcasts</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/rpoywc2ggqpyzj0h09x3go6o7os3?.jpg" />
  <itunes:category text="Technology" />
  <item>
    <itunes:title>Dan Ricci on Four Years of the ICS Advisory Project</itunes:title>
    <title>Dan Ricci on Four Years of the ICS Advisory Project</title>
    <itunes:summary><![CDATA[Industrial cybersecurity expert Dan Ricci, the founder and maintainer of the ICS Advisory Project, joins the Nexus Podcast to discuss the evolution of the industry's premier ICS and OT security advisory repository as it turns 4 years old.  Dan talks about the impact of the project on OT security teams, the dashboards he's created to better parse the volume of data on the site, and unique use cases that asset owners and operators have for this critical information.  Subscribe and lis...]]></itunes:summary>
    <description><![CDATA[<p>Industrial cybersecurity expert Dan Ricci, the founder and maintainer of the <a href='https://www.icsadvisoryproject.com/'>ICS Advisory Project</a>, joins the Nexus Podcast to discuss the evolution of the industry&apos;s premier ICS and OT security advisory repository as it turns 4 years old. </p><p>Dan talks about the impact of the project on OT security teams, the dashboards he&apos;s created to better parse the volume of data on the site, and unique use cases that asset owners and operators have for this critical information. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Industrial cybersecurity expert Dan Ricci, the founder and maintainer of the <a href='https://www.icsadvisoryproject.com/'>ICS Advisory Project</a>, joins the Nexus Podcast to discuss the evolution of the industry&apos;s premier ICS and OT security advisory repository as it turns 4 years old. </p><p>Dan talks about the impact of the project on OT security teams, the dashboards he&apos;s created to better parse the volume of data on the site, and unique use cases that asset owners and operators have for this critical information. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18795561-dan-ricci-on-four-years-of-the-ics-advisory-project.mp3" length="20877599" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18795561</guid>
    <pubDate>Sun, 08 Mar 2026 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="400.217" duration="31.5" />
    <itunes:duration>1738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>119</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dan Gunter on Creating Malicious OT Test Data to Train Security Tools</itunes:title>
    <title>Dan Gunter on Creating Malicious OT Test Data to Train Security Tools</title>
    <itunes:summary><![CDATA[Insane Cyber CEO and founder Dan Gunter joins the Nexus Podcast in an episode recorded live at the S4 Conference in Miami. Dan explains a process for generating malicous OT data in order to test the efficacy of an organization's intrusion detection and other security products. Generating such data has its barriers, but it's crucial, he said, in order to train products and security analysts how to spot malicious and anomalous traffic. Dan talks about using emulators and achieving success on a ...]]></itunes:summary>
    <description><![CDATA[<p>Insane Cyber CEO and founder Dan Gunter joins the Nexus Podcast in an episode recorded live at the S4 Conference in Miami. Dan explains a process for generating malicous OT data in order to test the efficacy of an organization&apos;s intrusion detection and other security products. Generating such data has its barriers, but it&apos;s crucial, he said, in order to train products and security analysts how to spot malicious and anomalous traffic. Dan talks about using emulators and achieving success on a relatively small budget. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Insane Cyber CEO and founder Dan Gunter joins the Nexus Podcast in an episode recorded live at the S4 Conference in Miami. Dan explains a process for generating malicous OT data in order to test the efficacy of an organization&apos;s intrusion detection and other security products. Generating such data has its barriers, but it&apos;s crucial, he said, in order to train products and security analysts how to spot malicious and anomalous traffic. Dan talks about using emulators and achieving success on a relatively small budget. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18765792-dan-gunter-on-creating-malicious-ot-test-data-to-train-security-tools.mp3" length="19679242" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18765792</guid>
    <pubDate>Sun, 01 Mar 2026 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="87.967" duration="15.0" />
    <itunes:duration>1638</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>118</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mike Holcomb on the Intersection of Hacktivists, State Actors</itunes:title>
    <title>Mike Holcomb on the Intersection of Hacktivists, State Actors</title>
    <itunes:summary><![CDATA[Mike Holcomb joins the Nexus Podcast to discuss a Converged Actor Framework he developed and presented at the S4 Conference. The framework delineates  groups such as hacktivists and state threat actors based on the impact and frequency of their activity. State actors are leveraging hacktivist groups with greater frequency, and this convergence must be considered as defenders tasked with protecting OT and cyber-physical systems strategize around security.  Subscribe and listen to the...]]></itunes:summary>
    <description><![CDATA[<p>Mike Holcomb joins the Nexus Podcast to discuss a Converged Actor Framework he developed and presented at the S4 Conference. The framework delineates  groups such as hacktivists and state threat actors based on the impact and frequency of their activity. State actors are leveraging hacktivist groups with greater frequency, and this convergence must be considered as defenders tasked with protecting OT and cyber-physical systems strategize around security. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p><p><a href='https://www.youtube.com/@utilsec'>Subscribe to Mike Holcomb&apos;s YouTube channel here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Mike Holcomb joins the Nexus Podcast to discuss a Converged Actor Framework he developed and presented at the S4 Conference. The framework delineates  groups such as hacktivists and state threat actors based on the impact and frequency of their activity. State actors are leveraging hacktivist groups with greater frequency, and this convergence must be considered as defenders tasked with protecting OT and cyber-physical systems strategize around security. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p><p><a href='https://www.youtube.com/@utilsec'>Subscribe to Mike Holcomb&apos;s YouTube channel here</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18748105-mike-holcomb-on-the-intersection-of-hacktivists-state-actors.mp3" length="20413058" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18748105</guid>
    <pubDate>Wed, 25 Feb 2026 13:00:00 -0500</pubDate>
    <podcast:soundbite startTime="506.217" duration="31.0" />
    <itunes:duration>1699</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>117</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISA&#39;s Matthew Rogers on Secure OT Protocol Communication</itunes:title>
    <title>CISA&#39;s Matthew Rogers on Secure OT Protocol Communication</title>
    <itunes:summary><![CDATA[Matthew Rogers, ICS Cybersecurity Lead at the Cybersecurity Infrastructure and Security Agency (CISA) joins the Nexus Podcast to discuss new guidance published by the agency to help manufacturers and asset owners move toward more secure OT communication protocols.  Legacy protocols that contain little to no basic security capabilities are still prevalent in OT environments today. Rogers explains the risk and why manufacturers should begin their journey away from proprietary protocols and...]]></itunes:summary>
    <description><![CDATA[<p>Matthew Rogers, ICS Cybersecurity Lead at the Cybersecurity Infrastructure and Security Agency (CISA) joins the Nexus Podcast to discuss new guidance published by the agency to help manufacturers and asset owners move toward more secure OT communication protocols. </p><p>Legacy protocols that contain little to no basic security capabilities are still prevalent in OT environments today. Rogers explains the risk and why manufacturers should begin their journey away from proprietary protocols and toward open standards. According to CISA&apos;s guidance, operators want authentication and integrity capabilities to protect process data, but need to understand the value and business impact of doing so. </p><p><a href='https://www.cisa.gov/resources-tools/resources/barriers-secure-ot-communication-why-johnny-cant-authenticate'>Download CISA&apos;s guidance here</a>. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Matthew Rogers, ICS Cybersecurity Lead at the Cybersecurity Infrastructure and Security Agency (CISA) joins the Nexus Podcast to discuss new guidance published by the agency to help manufacturers and asset owners move toward more secure OT communication protocols. </p><p>Legacy protocols that contain little to no basic security capabilities are still prevalent in OT environments today. Rogers explains the risk and why manufacturers should begin their journey away from proprietary protocols and toward open standards. According to CISA&apos;s guidance, operators want authentication and integrity capabilities to protect process data, but need to understand the value and business impact of doing so. </p><p><a href='https://www.cisa.gov/resources-tools/resources/barriers-secure-ot-communication-why-johnny-cant-authenticate'>Download CISA&apos;s guidance here</a>. </p><p><a href='https://nexusconnect.io/podcasts'>Subscribe and listen to the Nexus Podcast here</a>. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18678844-cisa-s-matthew-rogers-on-secure-ot-protocol-communication.mp3" length="27434453" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18678844</guid>
    <pubDate>Sun, 15 Feb 2026 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1301.5" duration="26.5" />
    <itunes:duration>2284</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>116</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jay Catherine on Securing Logistics, OT in Retail</itunes:title>
    <title>Jay Catherine on Securing Logistics, OT in Retail</title>
    <itunes:summary><![CDATA[Jay Catherine, security architect for a major retailer, joins the Nexus Podcast to discuss the intricacies of securing logistics and operational technology within the retail sector.  Catherine covers various aspects of logistics cybersecurity, including risks introduced by connecting OT and IoT to the network, and the challenges of managing third-party vendor and supply chain relationships.  He also discusses his unconventional career path, from hockey broadcaster to his current cyb...]]></itunes:summary>
    <description><![CDATA[<p>Jay Catherine, security architect for a major retailer, joins the Nexus Podcast to discuss the intricacies of securing logistics and operational technology within the retail sector. </p><p>Catherine covers various aspects of logistics cybersecurity, including risks introduced by connecting OT and IoT to the network, and the challenges of managing third-party vendor and supply chain relationships. </p><p>He also discusses his unconventional career path, from hockey broadcaster to his current cybersecurity role. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p><p><a href='https://podcast.feedspot.com/iot_security_podcasts/'>Feedspot has named Nexus a top IoT security podcast for 2025</a></p>]]></description>
    <content:encoded><![CDATA[<p>Jay Catherine, security architect for a major retailer, joins the Nexus Podcast to discuss the intricacies of securing logistics and operational technology within the retail sector. </p><p>Catherine covers various aspects of logistics cybersecurity, including risks introduced by connecting OT and IoT to the network, and the challenges of managing third-party vendor and supply chain relationships. </p><p>He also discusses his unconventional career path, from hockey broadcaster to his current cybersecurity role. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p><p><a href='https://podcast.feedspot.com/iot_security_podcasts/'>Feedspot has named Nexus a top IoT security podcast for 2025</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18381170-jay-catherine-on-securing-logistics-ot-in-retail.mp3" length="24984673" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18381170</guid>
    <pubDate>Thu, 18 Dec 2025 18:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1047.633" duration="15.0" />
    <itunes:duration>2080</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>115</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare</itunes:title>
    <title>Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare</title>
    <itunes:summary><![CDATA[Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit.  The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and is also used to measure risk appropriately for each of those services. Listen and subscribe to the Nexus Podcast.  Get the SMART Toolkit...]]></itunes:summary>
    <description><![CDATA[<p>Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. </p><p>The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and is also used to measure risk appropriately for each of those services.</p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast.</a> </p><p><a href='https://healthsectorcouncil.org/smart-toolkit/'>Get the SMART Toolkit here</a>. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. </p><p>The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and is also used to measure risk appropriately for each of those services.</p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast.</a> </p><p><a href='https://healthsectorcouncil.org/smart-toolkit/'>Get the SMART Toolkit here</a>. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18232292-greg-garcia-on-the-sector-mapping-and-risk-toolkit-for-healthcare.mp3" length="26614119" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18232292</guid>
    <pubDate>Sun, 23 Nov 2025 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="440.017" duration="48.5" />
    <itunes:duration>2216</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>114</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Christopher Frenz on Evidence-Based Security</itunes:title>
    <title>Christopher Frenz on Evidence-Based Security</title>
    <itunes:summary><![CDATA[O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science.  Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how the insights gained from this testing have allowed him to move toward better metrics and a better working relationship with leadership and th...]]></itunes:summary>
    <description><![CDATA[<p>O&apos;Reilly coauthor of <a href='https://www.oreilly.com/library/view/evidence-based-security/9781098148942/'><em>Evidence-Based Security</em></a> and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization&apos;s approach to cybersecurity that is rooted in transforming security from an artform to a science. </p><p>Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how the insights gained from this testing have allowed him to move toward better metrics and a better working relationship with leadership and the board. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast.</a> </p>]]></description>
    <content:encoded><![CDATA[<p>O&apos;Reilly coauthor of <a href='https://www.oreilly.com/library/view/evidence-based-security/9781098148942/'><em>Evidence-Based Security</em></a> and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization&apos;s approach to cybersecurity that is rooted in transforming security from an artform to a science. </p><p>Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how the insights gained from this testing have allowed him to move toward better metrics and a better working relationship with leadership and the board. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast.</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/18191600-christopher-frenz-on-evidence-based-security.mp3" length="21269111" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18191600</guid>
    <pubDate>Sun, 16 Nov 2025 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="202.483" duration="30.5" />
    <itunes:duration>1770</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>113</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Adm. Michael Rogers on Deterrence in Cyberspace</itunes:title>
    <title>Adm. Michael Rogers on Deterrence in Cyberspace</title>
    <itunes:summary><![CDATA[Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies.  Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.S. critical infrastructure.  Adm. Rogers also touches on Congress' failure to re-authorize the Cybersecurity Information Sharing Act (CI...]]></itunes:summary>
    <description><![CDATA[<p>Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. </p><p>Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.S. critical infrastructure. </p><p>Adm. Rogers also touches on Congress&apos; failure to re-authorize the Cybersecurity Information Sharing Act (CISA 15) and what it means for defenders as the reauthorization deadline passes, and the resource challenges affecting adequate protection of critical infrastructure. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. </p><p>Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.S. critical infrastructure. </p><p>Adm. Rogers also touches on Congress&apos; failure to re-authorize the Cybersecurity Information Sharing Act (CISA 15) and what it means for defenders as the reauthorization deadline passes, and the resource challenges affecting adequate protection of critical infrastructure. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17939313-adm-michael-rogers-on-deterrence-in-cyberspace.mp3" length="25029182" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17939313</guid>
    <pubDate>Wed, 01 Oct 2025 13:00:00 -0400</pubDate>
    <podcast:soundbite startTime="420.55" duration="32.0" />
    <itunes:duration>2084</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>112</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bob Maley on Resource Challenges in Cybersecurity</itunes:title>
    <title>Bob Maley on Resource Challenges in Cybersecurity</title>
    <itunes:summary><![CDATA[Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing volatile times in protecting critical sectors.  Listen and subscribe to the Nexus Podcast.   ]]></itunes:summary>
    <description><![CDATA[<p>Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it&apos;s budgets, workforce shortages, or technical debt, security leaders are facing volatile times in protecting critical sectors. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it&apos;s budgets, workforce shortages, or technical debt, security leaders are facing volatile times in protecting critical sectors. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a>.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17829294-bob-maley-on-resource-challenges-in-cybersecurity.mp3" length="23559955" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17829294</guid>
    <pubDate>Sun, 14 Sep 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="581.0" duration="23.5" />
    <itunes:duration>1961</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>111</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Pankaj Goyal on Cyber Insurance Coverage for OT Environments</itunes:title>
    <title>Pankaj Goyal on Cyber Insurance Coverage for OT Environments</title>
    <itunes:summary><![CDATA[Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments.  Underwriters have prolific amounts of historical data and experience in calculating risk and exposure around IT, but cannot say the same for OT.  Goyal discusses how fragmentation in the OT ecosystem, along with...]]></itunes:summary>
    <description><![CDATA[<p>Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. </p><p>Underwriters have prolific amounts of historical data and experience in calculating risk and exposure around IT, but cannot say the same for OT. </p><p>Goyal discusses how fragmentation in the OT ecosystem, along with an ever-expanding attack surface, is contributing to the challenges around properly insuring these environments. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></description>
    <content:encoded><![CDATA[<p>Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. </p><p>Underwriters have prolific amounts of historical data and experience in calculating risk and exposure around IT, but cannot say the same for OT. </p><p>Goyal discusses how fragmentation in the OT ecosystem, along with an ever-expanding attack surface, is contributing to the challenges around properly insuring these environments. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17756333-pankaj-goyal-on-cyber-insurance-coverage-for-ot-environments.mp3" length="21267575" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17756333</guid>
    <pubDate>Mon, 01 Sep 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="234.133" duration="22.5" />
    <itunes:duration>1770</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>110</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rui Ataide on Navigating Ransomware Negotiations</itunes:title>
    <title>Rui Ataide on Navigating Ransomware Negotiations</title>
    <itunes:summary><![CDATA[Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations.  Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management calculus for victims, and how cybersecurity insurance figures into negotiations.  Listen and subscribe to the Nexus Podcast ]]></itunes:summary>
    <description><![CDATA[<p>Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. </p><p>Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management calculus for victims, and how cybersecurity insurance figures into negotiations. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></description>
    <content:encoded><![CDATA[<p>Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. </p><p>Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management calculus for victims, and how cybersecurity insurance figures into negotiations. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17710805-rui-ataide-on-navigating-ransomware-negotiations.mp3" length="20651584" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17710805</guid>
    <pubDate>Mon, 25 Aug 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="917.417" duration="30.0" />
    <itunes:duration>1719</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>109</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Salvatore Gariuolo on Safe EV Charging</itunes:title>
    <title>Salvatore Gariuolo on Safe EV Charging</title>
    <itunes:summary><![CDATA[Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging.  Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces a handful of cybersecurity enhancements, it is not sufficient to fully secure the EV charging ecosystem. Listen and subscribe to the Nexus P...]]></itunes:summary>
    <description><![CDATA[<p>Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. </p><p>Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces a handful of cybersecurity enhancements, it is not sufficient to fully secure the EV charging ecosystem.</p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></description>
    <content:encoded><![CDATA[<p>Salvatore Gariuolo, a senior threat researcher at Trend Micro, joins the Nexus Podcast to discuss safe EV charging and in particular, the ISO 15118 standard meant to create a trusted environment for electric vehicle charging. </p><p>Gariuolo contends that while ISO 15118 offers substantial improvements that reduce pressure on the grid, and also introduces a handful of cybersecurity enhancements, it is not sufficient to fully secure the EV charging ecosystem.</p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17655093-salvatore-gariuolo-on-safe-ev-charging.mp3" length="18296155" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17655093</guid>
    <pubDate>Sun, 17 Aug 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="888.65" duration="23.0" />
    <itunes:duration>1523</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>108</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on Hacking Video Surveillance</itunes:title>
    <title>Noam Moshe on Hacking Video Surveillance</title>
    <itunes:summary><![CDATA[Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications.  Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clients (camera) and uncovered four vulnerabilities that could be chained to eventually gain pre-authentication remote-code execution.  Mosh...]]></itunes:summary>
    <description><![CDATA[<p>Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. </p><p>Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clients (camera) and uncovered four vulnerabilities that could be chained to eventually gain pre-authentication remote-code execution. </p><p>Moshe explains Team82&apos;s research process, the risks to users, and the successful disclosure process with Axis Communication that resulted in prompt patches available for the servers and camera platforms. </p><p><a href='https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis'>Read Team82&apos;s research blog here</a></p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></description>
    <content:encoded><![CDATA[<p>Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. </p><p>Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clients (camera) and uncovered four vulnerabilities that could be chained to eventually gain pre-authentication remote-code execution. </p><p>Moshe explains Team82&apos;s research process, the risks to users, and the successful disclosure process with Axis Communication that resulted in prompt patches available for the servers and camera platforms. </p><p><a href='https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis'>Read Team82&apos;s research blog here</a></p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17631720-noam-moshe-on-hacking-video-surveillance.mp3" length="20063499" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17631720</guid>
    <pubDate>Thu, 07 Aug 2025 15:00:00 -0400</pubDate>
    <podcast:soundbite startTime="135.817" duration="17.5" />
    <itunes:duration>1670</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>107</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dan Berte on Solar Grid and IoT Vulnerabilities</itunes:title>
    <title>Dan Berte on Solar Grid and IoT Vulnerabilities</title>
    <itunes:summary><![CDATA[Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initiatives overall. With the growing popularity of these platforms, Berte cautions that attackers are going to continue to analyze their security for we...]]></itunes:summary>
    <description><![CDATA[<p>Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team&apos;s ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform.</p><p>Dan discusses his team&apos;s research, the disclosure process, and the implications on green energy initiatives overall. With the growing popularity of these platforms, Berte cautions that attackers are going to continue to analyze their security for weaknesses and attempt to exploit them. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p><p><br/></p><p><br/></p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team&apos;s ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform.</p><p>Dan discusses his team&apos;s research, the disclosure process, and the implications on green energy initiatives overall. With the growing popularity of these platforms, Berte cautions that attackers are going to continue to analyze their security for weaknesses and attempt to exploit them. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p><p><br/></p><p><br/></p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17558821-dan-berte-on-solar-grid-and-iot-vulnerabilities.mp3" length="23318893" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17558821</guid>
    <pubDate>Mon, 28 Jul 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="487.4" duration="17.0" />
    <itunes:duration>1941</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>106</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vivek Ponnada on the Ongoing Maturity of OT Security</itunes:title>
    <title>Vivek Ponnada on the Ongoing Maturity of OT Security</title>
    <itunes:summary><![CDATA[OT cybersecurity veteran Vivek Ponnada, SVP Growth &amp; Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT securi...]]></itunes:summary>
    <description><![CDATA[<p>OT cybersecurity veteran Vivek Ponnada, SVP Growth &amp; Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT security landscape. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>OT cybersecurity veteran Vivek Ponnada, SVP Growth &amp; Strategy at Frenos, joins the Nexus Podcast to lend his expertise on the areas where he is seeing the most maturity and rapid evolution in the practice. Vivek explains the growing demand for contextual information to supplement the data organizations have around their known assets and vulnerabilities, for example. He also explains current risk prioritization and mitigation strategies, and how advanced technologies fit into the OT security landscape. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17520952-vivek-ponnada-on-the-ongoing-maturity-of-ot-security.mp3" length="25886531" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17520952</guid>
    <pubDate>Mon, 21 Jul 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="412.667" duration="28.0" />
    <itunes:duration>2155</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>105</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Austin Allen on the Cybersecurity Realities Facing Healthcare</itunes:title>
    <title>Austin Allen on the Cybersecurity Realities Facing Healthcare</title>
    <itunes:summary><![CDATA[Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations.  Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impacting patient care.  Allen also discusses the role of federal and industry regulations and the role of compliance in guiding hospital cybers...]]></itunes:summary>
    <description><![CDATA[<p>Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations. </p><p>Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impacting patient care. </p><p>Allen also discusses the role of federal and industry regulations and the role of compliance in guiding hospital cybersecurity programs.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, joins the Nexus Podcast to discuss cybersecurity realities happening inside healthcare delivery organizations. </p><p>Allen covers challenges and solutions around legacy software managing connected medical devices, and other cybersecurity risks potentially negatively impacting patient care. </p><p>Allen also discusses the role of federal and industry regulations and the role of compliance in guiding hospital cybersecurity programs.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17485816-austin-allen-on-the-cybersecurity-realities-facing-healthcare.mp3" length="20992038" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17485816</guid>
    <pubDate>Sun, 13 Jul 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="570.383" duration="26.5" />
    <itunes:duration>1747</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>104</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Gentry Lane on the Use of &#39;Salami Cuts&#39; in Cyber Conflict</itunes:title>
    <title>Gentry Lane on the Use of &#39;Salami Cuts&#39; in Cyber Conflict</title>
    <itunes:summary><![CDATA[Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said.  To disrupt the U.S.' standing as such, these adversaries have chose cyberspace as a front where they're on relatively equal footing. They're doing so incrementally, Lane said, known as s...]]></itunes:summary>
    <description><![CDATA[<p>Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said. </p><p>To disrupt the U.S.&apos; standing as such, these adversaries have chose cyberspace as a front where they&apos;re on relatively equal footing. They&apos;re doing so incrementally, Lane said, known as salami tactics. Salami tactics is a strategy of gradually cutting into an opposition&apos;s dominance by instilling distrust in institutions, utilities, or the government&apos;s ability to protect us. Gentry describes theses tactics, their effectiveness, and what critical infrastructure defenders should be doing to protect their systems and networks. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss the strategies guiding adversaries in their targeting of U.S. critical infrastructure. Primary of which is the desire of countries such as China, Russia, Iran, and North Korea to displace the U.S. as the global hegemon, she said. </p><p>To disrupt the U.S.&apos; standing as such, these adversaries have chose cyberspace as a front where they&apos;re on relatively equal footing. They&apos;re doing so incrementally, Lane said, known as salami tactics. Salami tactics is a strategy of gradually cutting into an opposition&apos;s dominance by instilling distrust in institutions, utilities, or the government&apos;s ability to protect us. Gentry describes theses tactics, their effectiveness, and what critical infrastructure defenders should be doing to protect their systems and networks. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17444068-gentry-lane-on-the-use-of-salami-cuts-in-cyber-conflict.mp3" length="20668843" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17444068</guid>
    <pubDate>Sun, 06 Jul 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="442.233" duration="17.0" />
    <itunes:duration>1720</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>103</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Pedro Umbelino on Exploiting ATG Devices in Fuel Storage</itunes:title>
    <title>Pedro Umbelino on Exploiting ATG Devices in Fuel Storage</title>
    <itunes:summary><![CDATA[Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors.  ATG systems are an industrial control system that monitors fuel levels inside storage tanks, including those at gasoline stations, military bases, hospitals, airports, and elsewhere. ATGs track fuel levels, and are meant to detect leak...]]></itunes:summary>
    <description><![CDATA[<p>Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team&apos;s research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. </p><p>ATG systems are an industrial control system that monitors fuel levels inside storage tanks, including those at gasoline stations, military bases, hospitals, airports, and elsewhere. ATGs track fuel levels, and are meant to detect leaks, help with inventory management, and are key in regulatory compliance efforts.</p><p>The vulnerabilities uncovered by Pedro and his team expose these systems to catastrophic risks, from environmental hazards to significant economic losses, including physical damage.</p><p>Worse yet is that these systems are old and challenging to update. </p><p><a href='https://www.bitsight.com/blog/critical-vulnerabilities-discovered-automated-tank-gauge-systems'>Read Bitsight&apos;s research here</a>.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team&apos;s research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. </p><p>ATG systems are an industrial control system that monitors fuel levels inside storage tanks, including those at gasoline stations, military bases, hospitals, airports, and elsewhere. ATGs track fuel levels, and are meant to detect leaks, help with inventory management, and are key in regulatory compliance efforts.</p><p>The vulnerabilities uncovered by Pedro and his team expose these systems to catastrophic risks, from environmental hazards to significant economic losses, including physical damage.</p><p>Worse yet is that these systems are old and challenging to update. </p><p><a href='https://www.bitsight.com/blog/critical-vulnerabilities-discovered-automated-tank-gauge-systems'>Read Bitsight&apos;s research here</a>.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17402924-pedro-umbelino-on-exploiting-atg-devices-in-fuel-storage.mp3" length="19634078" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17402924</guid>
    <pubDate>Sun, 29 Jun 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="529.067" duration="37.0" />
    <itunes:duration>1634</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>102</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Steven Sim on OT-ISAC and the State of Information Sharing</itunes:title>
    <title>Steven Sim on OT-ISAC and the State of Information Sharing</title>
    <itunes:summary><![CDATA[Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC's activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organizations contribute and participate in discussions and events that level up the maturity of cybersecurity practices within OT asset-heavy enterprises.&nbs...]]></itunes:summary>
    <description><![CDATA[<p>Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC&apos;s activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organizations contribute and participate in discussions and events that level up the maturity of cybersecurity practices within OT asset-heavy enterprises. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Steven Sim, Chair of the OT-ISAC Advisory Committee, joins the Nexus Podcast to catch us up on the ISAC&apos;s activities, and some of the upcoming community-driven initiatives sponsored by the group. Steven shares the processes by which member organizations share incident, threat, and vulnerability information. He also discusses how member organizations contribute and participate in discussions and events that level up the maturity of cybersecurity practices within OT asset-heavy enterprises. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17371207-steven-sim-on-ot-isac-and-the-state-of-information-sharing.mp3" length="31079163" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17371207</guid>
    <pubDate>Mon, 23 Jun 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="973.017" duration="25.0" />
    <itunes:duration>2588</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>101</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sarah Fluchs on the Cyber Resilience Act</itunes:title>
    <title>Sarah Fluchs on the Cyber Resilience Act</title>
    <itunes:summary><![CDATA[Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the EU's Cyber Resilience Act and what it means for manufacturers of "products with digital elements" as they aim toward a 2027 compliance deadline.  Sarah provides her insight on the regulation's essential requirements, its focus on secure-by-design and overall cyber resilience of products, and the milestones manufacturers need to hit as their compliance efforts get under way.  ...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the <a href='https://fluchsfriction.medium.com/cyber-resilience-act-in-5-minutes-018f43f69508'>EU&apos;s Cyber Resilience Act</a> and what it means for manufacturers of &quot;products with digital elements&quot; as they aim toward a 2027 compliance deadline. </p><p>Sarah provides her insight on the regulation&apos;s essential requirements, its focus on secure-by-design and overall cyber resilience of products, and the milestones manufacturers need to hit as their compliance efforts get under way. </p><p>Sarah also discusses her thought leadership and work in <a href='https://fluchsfriction.medium.com/make-the-big-decisions-with-cyber-decision-diagrams-f950b6966542'>bringing cybersecurity to engineers, asset operators, and other non-security teams</a>. It&apos;s important, she says, to eliminate cybersecurity&apos;s innate complexity and bring these concepts to engineers and others on their terms. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the <a href='https://fluchsfriction.medium.com/cyber-resilience-act-in-5-minutes-018f43f69508'>EU&apos;s Cyber Resilience Act</a> and what it means for manufacturers of &quot;products with digital elements&quot; as they aim toward a 2027 compliance deadline. </p><p>Sarah provides her insight on the regulation&apos;s essential requirements, its focus on secure-by-design and overall cyber resilience of products, and the milestones manufacturers need to hit as their compliance efforts get under way. </p><p>Sarah also discusses her thought leadership and work in <a href='https://fluchsfriction.medium.com/make-the-big-decisions-with-cyber-decision-diagrams-f950b6966542'>bringing cybersecurity to engineers, asset operators, and other non-security teams</a>. It&apos;s important, she says, to eliminate cybersecurity&apos;s innate complexity and bring these concepts to engineers and others on their terms. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17351851-sarah-fluchs-on-the-cyber-resilience-act.mp3" length="27211855" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17351851</guid>
    <pubDate>Tue, 17 Jun 2025 15:00:00 -0400</pubDate>
    <podcast:soundbite startTime="300.133" duration="22.5" />
    <itunes:duration>2266</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>100</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Andrew Ohrt on Cyber-Informed Engineering</itunes:title>
    <title>Andrew Ohrt on Cyber-Informed Engineering</title>
    <itunes:summary><![CDATA[Andrew Ohrt, the resilience practice area lead at West Yost, joins the Nexus Podcast to discuss cyber-informed engineering (CIE) and how it informs engineers and asset operators to understand their role in creating and maintaining a cyber resilient organization. According to Ohrt, CIE is one of the best examples of delivering cybersecurity concepts to non-security teams, speaking to them in their language, and avoiding the often-intimidating jargon that can dominate cybersecurity discussions....]]></itunes:summary>
    <description><![CDATA[<p>Andrew Ohrt, the resilience practice area lead at West Yost, joins the Nexus Podcast to discuss cyber-informed engineering (CIE) and how it informs engineers and asset operators to understand their role in creating and maintaining a cyber resilient organization. According to Ohrt, CIE is one of the best examples of delivering cybersecurity concepts to non-security teams, speaking to them in their language, and avoiding the often-intimidating jargon that can dominate cybersecurity discussions.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Andrew Ohrt, the resilience practice area lead at West Yost, joins the Nexus Podcast to discuss cyber-informed engineering (CIE) and how it informs engineers and asset operators to understand their role in creating and maintaining a cyber resilient organization. According to Ohrt, CIE is one of the best examples of delivering cybersecurity concepts to non-security teams, speaking to them in their language, and avoiding the often-intimidating jargon that can dominate cybersecurity discussions.</p><p><a href='https://nexusconnect.io/podcasts'>Listen to the Nexus Podcast on your favorite podcast platform</a>.</p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17267685-andrew-ohrt-on-cyber-informed-engineering.mp3" length="26740713" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17267685</guid>
    <pubDate>Tue, 03 Jun 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="584.0" duration="16.5" />
    <itunes:duration>2226</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>99</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Megan Stifel on the Impact of the Ransomware Task Force</itunes:title>
    <title>Megan Stifel on the Impact of the Ransomware Task Force</title>
    <itunes:summary><![CDATA[Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the Nexus Podcast to discuss the four years of progress and challenges experienced by the Ransomware Task Force.  The RTF was created days before the Colonial Pipeline ransomware incident and in a landmark report, laid out 48 recommendations to the industry that included a framework for critical infrastructure organizations that could help deter and disrupt the operations of ransomware gangs.  ...]]></itunes:summary>
    <description><![CDATA[<p>Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the Nexus Podcast to discuss the four years of progress and challenges experienced by the <a href='https://securityandtechnology.org/ransomwaretaskforce/'>Ransomware Task Force</a>. </p><p>The RTF was created days before the Colonial Pipeline ransomware incident and in a landmark <a href='https://securityandtechnology.org/ransomwaretaskforce/report/'>report</a>, laid out 48 recommendations to the industry that included a framework for critical infrastructure organizations that could help deter and disrupt the operations of ransomware gangs. </p><p>Stifel covers the growth of the task force and which the of the 48 recommendations have been tackled and which remain. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the Nexus Podcast to discuss the four years of progress and challenges experienced by the <a href='https://securityandtechnology.org/ransomwaretaskforce/'>Ransomware Task Force</a>. </p><p>The RTF was created days before the Colonial Pipeline ransomware incident and in a landmark <a href='https://securityandtechnology.org/ransomwaretaskforce/report/'>report</a>, laid out 48 recommendations to the industry that included a framework for critical infrastructure organizations that could help deter and disrupt the operations of ransomware gangs. </p><p>Stifel covers the growth of the task force and which the of the 48 recommendations have been tackled and which remain. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17233269-megan-stifel-on-the-impact-of-the-ransomware-task-force.mp3" length="21480411" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17233269</guid>
    <pubDate>Wed, 28 May 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1159.05" duration="41.0" />
    <itunes:duration>1788</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>98</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Joe Slowik on Identifying Truly &#39;Critical&#39; Infrastructure</itunes:title>
    <title>Joe Slowik on Identifying Truly &#39;Critical&#39; Infrastructure</title>
    <itunes:summary><![CDATA[Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly "critical," and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped.  Slowik acknowledges that while calling everything "critical" ensures that nothing is critical, serious discussions must be had about getting the most return in terms of defensive resources while recognizing the ethical dile...]]></itunes:summary>
    <description><![CDATA[<p>Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly &quot;critical,&quot; and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped. </p><p>Slowik acknowledges that while calling everything &quot;critical&quot; ensures that nothing is critical, serious discussions must be had about getting the most return in terms of defensive resources while recognizing the ethical dilemmas that some entities cannot be left behind because they&apos;re not as important to overall national and economic security. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly &quot;critical,&quot; and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped. </p><p>Slowik acknowledges that while calling everything &quot;critical&quot; ensures that nothing is critical, serious discussions must be had about getting the most return in terms of defensive resources while recognizing the ethical dilemmas that some entities cannot be left behind because they&apos;re not as important to overall national and economic security. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17170962-joe-slowik-on-identifying-truly-critical-infrastructure.mp3" length="21464428" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17170962</guid>
    <pubDate>Sun, 18 May 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="67.333" duration="40.5" />
    <itunes:duration>1787</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>97</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Danielle Jablanski on Critical Infrastructure Protection</itunes:title>
    <title>Danielle Jablanski on Critical Infrastructure Protection</title>
    <itunes:summary><![CDATA[Danielle Jablanski, Industrial Control Systems Strategist &amp; Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government's role as a cybersecurity partner on implementation guidance and enablement.  Danielle touches on a number of areas of CI security and protection, ranging from the challenges arising from the high percentage of private sector ownership of critical infrastructure, to the assistance available ...]]></itunes:summary>
    <description><![CDATA[<p>Danielle Jablanski,<b> </b>Industrial Control Systems Strategist &amp; Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government&apos;s role as a cybersecurity partner on implementation guidance and enablement. </p><p>Danielle touches on a number of areas of CI security and protection, ranging from the challenges arising from the high percentage of private sector ownership of critical infrastructure, to the assistance available from CISA and other agencies to lesser-resourced entities in the 16 CI sectors. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Danielle Jablanski,<b> </b>Industrial Control Systems Strategist &amp; Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government&apos;s role as a cybersecurity partner on implementation guidance and enablement. </p><p>Danielle touches on a number of areas of CI security and protection, ranging from the challenges arising from the high percentage of private sector ownership of critical infrastructure, to the assistance available from CISA and other agencies to lesser-resourced entities in the 16 CI sectors. </p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast on your favorite platform</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17123983-danielle-jablanski-on-critical-infrastructure-protection.mp3" length="29856942" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17123983</guid>
    <pubDate>Sun, 11 May 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="597.0" duration="33.5" />
    <itunes:duration>2486</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>96</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cassie Crossley on Hardware Security, HBOMs</itunes:title>
    <title>Cassie Crossley on Hardware Security, HBOMs</title>
    <itunes:summary><![CDATA[Schneider Electric Vice President of Supply Chain Security Cassie Crossley joins the Nexus Podcast to discuss the nuances of hardware security and the growing need for hardware bills of materials (HBOMs) within critical infrastructure. Cassie covers the use cases and features that matter most within an HBOM, some of the threats and weaknesses they can illuminate for users, and how they can change the current status quo for CI sectors that have concerns about the provenance of hardware compone...]]></itunes:summary>
    <description><![CDATA[<p>Schneider Electric Vice President of Supply Chain Security Cassie Crossley joins the Nexus Podcast to discuss the nuances of hardware security and the growing need for hardware bills of materials (HBOMs) within critical infrastructure.</p><p>Cassie covers the use cases and features that matter most within an HBOM, some of the threats and weaknesses they can illuminate for users, and how they can change the current status quo for CI sectors that have concerns about the provenance of hardware components and the threats they pose. </p><p>Cassie is an experienced cybersecurity technology executive in information technology and product development and author of <a href='https://www.amazon.com/Software-Supply-Security-Cassie-Crossley-ebook/dp/B0CTWFSB2K?ref_=ast_author_mpb'>“Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware.”</a></p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>. </p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Schneider Electric Vice President of Supply Chain Security Cassie Crossley joins the Nexus Podcast to discuss the nuances of hardware security and the growing need for hardware bills of materials (HBOMs) within critical infrastructure.</p><p>Cassie covers the use cases and features that matter most within an HBOM, some of the threats and weaknesses they can illuminate for users, and how they can change the current status quo for CI sectors that have concerns about the provenance of hardware components and the threats they pose. </p><p>Cassie is an experienced cybersecurity technology executive in information technology and product development and author of <a href='https://www.amazon.com/Software-Supply-Security-Cassie-Crossley-ebook/dp/B0CTWFSB2K?ref_=ast_author_mpb'>“Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware.”</a></p><p><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>. </p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17088324-cassie-crossley-on-hardware-security-hboms.mp3" length="20423055" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17088324</guid>
    <pubDate>Wed, 07 May 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="922.333" duration="36.5" />
    <itunes:duration>1700</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>95</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Christiaan Beek on Ransomware&#39;s Evolution and Economics</itunes:title>
    <title>Christiaan Beek on Ransomware&#39;s Evolution and Economics</title>
    <itunes:summary><![CDATA[Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations.  In this episode, Beek covers extortion characteristics, the stealthiness of some attacks, and how the future may include hardware-based ransom...]]></itunes:summary>
    <description><![CDATA[<p>Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware&apos;s viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. </p><p>In this episode, Beek covers extortion characteristics, the stealthiness of some attacks, and how the future may include hardware-based ransomware that maintains indefinite persistence. </p><p><a href='https://nexusconnect.io/podcasts'>Follow and subscribe to the Nexus Podcast</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware&apos;s viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. </p><p>In this episode, Beek covers extortion characteristics, the stealthiness of some attacks, and how the future may include hardware-based ransomware that maintains indefinite persistence. </p><p><a href='https://nexusconnect.io/podcasts'>Follow and subscribe to the Nexus Podcast</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/17073014-christiaan-beek-on-ransomware-s-evolution-and-economics.mp3" length="21686674" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17073014</guid>
    <pubDate>Wed, 30 Apr 2025 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1670.633" duration="26.5" />
    <itunes:duration>1805</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>94</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard</itunes:title>
    <title>Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard</title>
    <itunes:summary><![CDATA[Florence Hudson, working group chair of the IEEE/UL 2933 standard and framework for Clinical IOT Data and Device Interoperability with TIPPSS, joins the Nexus Podcast. Published last September, the standard establishes a framework for secure data exchanges between clinical IoT and medical devices and systems. The frameworks is based on TIPPSS principles (trust, identity, privacy, protection, safety, and security) clinical IoT such as in-hospital devices, wearable devices, investigational devi...]]></itunes:summary>
    <description><![CDATA[<p>Florence Hudson, working group chair of the IEEE/UL 2933 standard and framework for Clinical IOT Data and Device Interoperability with TIPPSS, joins the Nexus Podcast. Published last September, the standard establishes a framework for secure data exchanges between clinical IoT and medical devices and systems. The frameworks is based on TIPPSS principles (trust, identity, privacy, protection, safety, and security) clinical IoT such as in-hospital devices, wearable devices, investigational devices.</p><p><a href='https://nexusconnect.io/podcasts'>Follow and subscribe to the Nexus Podcast</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Florence Hudson, working group chair of the IEEE/UL 2933 standard and framework for Clinical IOT Data and Device Interoperability with TIPPSS, joins the Nexus Podcast. Published last September, the standard establishes a framework for secure data exchanges between clinical IoT and medical devices and systems. The frameworks is based on TIPPSS principles (trust, identity, privacy, protection, safety, and security) clinical IoT such as in-hospital devices, wearable devices, investigational devices.</p><p><a href='https://nexusconnect.io/podcasts'>Follow and subscribe to the Nexus Podcast</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16877954-florence-hudson-on-the-ieee-ul-2933-clinical-iot-cybersecurity-standard.mp3" length="29296175" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16877954</guid>
    <pubDate>Sun, 30 Mar 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="913.867" duration="34.5" />
    <itunes:duration>2439</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>93</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mike Holcomb on Starting and Succeeding in OT Cybersecurity</itunes:title>
    <title>Mike Holcomb on Starting and Succeeding in OT Cybersecurity</title>
    <itunes:summary><![CDATA[Mike Holcomb, global lead for ICS and OT cybersecurity at Fluor, joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called "Getting Started in ICS/OT Cyber Security" where he explains the fundamentals of this unique cybersecurity discipline On the podcast, he discusses his ex...]]></itunes:summary>
    <description><![CDATA[<p>Mike Holcomb, global lead for ICS and OT cybersecurity at <a href='https://www.fluor.com/'>Fluor</a>, joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called &quot;<a href='https://www.youtube.com/watch?v=CCIrntyqe64&amp;list=PLOSJSv0hbPZAlINIh1HcB0L8AZcSPc80g&amp;ab_channel=MikeHolcomb'>Getting Started in ICS/OT Cyber Security</a>&quot; where he explains the fundamentals of this unique cybersecurity discipline On the podcast, he discusses his experience with those in IT now responsible for OT, how to best assess and mitigate risk within OT, and some of the practical threats that matter most to practitioners. </p><p><a href='https://nexusconnect.io/podcasts'>Follow the Nexus Podcast here.</a></p>]]></description>
    <content:encoded><![CDATA[<p>Mike Holcomb, global lead for ICS and OT cybersecurity at <a href='https://www.fluor.com/'>Fluor</a>, joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called &quot;<a href='https://www.youtube.com/watch?v=CCIrntyqe64&amp;list=PLOSJSv0hbPZAlINIh1HcB0L8AZcSPc80g&amp;ab_channel=MikeHolcomb'>Getting Started in ICS/OT Cyber Security</a>&quot; where he explains the fundamentals of this unique cybersecurity discipline On the podcast, he discusses his experience with those in IT now responsible for OT, how to best assess and mitigate risk within OT, and some of the practical threats that matter most to practitioners. </p><p><a href='https://nexusconnect.io/podcasts'>Follow the Nexus Podcast here.</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16817876-mike-holcomb-on-starting-and-succeeding-in-ot-cybersecurity.mp3" length="30742813" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16817876</guid>
    <pubDate>Wed, 19 Mar 2025 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1308.083" duration="46.0" />
    <itunes:duration>2560</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>92</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ron Fabela on Low-Skilled OT and ICS Threat Actors</itunes:title>
    <title>Ron Fabela on Low-Skilled OT and ICS Threat Actors</title>
    <itunes:summary><![CDATA[Ron Fabela of ABS Consulting joins the Nexus Podcast to dispel some of the myths surrounding threat actors targeting operational technology and industrial control systems. Groups such as the Russian Cyber Army, UserSec, and the CyberAv3ngers have different ideological motivations, and have decidedly carried out low-impact attacks on OT. Fabela covers some of their tactics, whether they're better marketers than hackers, and reminds users that their exploits still merit investigation and remedi...]]></itunes:summary>
    <description><![CDATA[<p>Ron Fabela of ABS Consulting joins the Nexus Podcast to dispel some of the myths surrounding threat actors targeting operational technology and industrial control systems. Groups such as the Russian Cyber Army, UserSec, and the CyberAv3ngers have different ideological motivations, and have decidedly carried out low-impact attacks on OT. Fabela covers some of their tactics, whether they&apos;re better marketers than hackers, and reminds users that their exploits still merit investigation and remediation. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Ron Fabela of ABS Consulting joins the Nexus Podcast to dispel some of the myths surrounding threat actors targeting operational technology and industrial control systems. Groups such as the Russian Cyber Army, UserSec, and the CyberAv3ngers have different ideological motivations, and have decidedly carried out low-impact attacks on OT. Fabela covers some of their tactics, whether they&apos;re better marketers than hackers, and reminds users that their exploits still merit investigation and remediation. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16664084-ron-fabela-on-low-skilled-ot-and-ics-threat-actors.mp3" length="26341371" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16664084</guid>
    <pubDate>Mon, 24 Feb 2025 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="566.917" duration="22.0" />
    <itunes:duration>2193</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>91</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents</itunes:title>
    <title>Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents</title>
    <itunes:summary><![CDATA[Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa.  ]]></itunes:summary>
    <description><![CDATA[<p>Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa. </p>]]></description>
    <content:encoded><![CDATA[<p>Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16611854-munish-walther-puri-on-creating-a-scale-for-cybersecurity-incidents.mp3" length="24086306" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16611854</guid>
    <pubDate>Mon, 17 Feb 2025 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="425.683" duration="21.5" />
    <itunes:duration>2005</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>90</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Brian Foster on the Risks of a Hyperconnected Grid</itunes:title>
    <title>Brian Foster on the Risks of a Hyperconnected Grid</title>
    <itunes:summary><![CDATA[Brian Foster, Senior Advisor for Grid Security at Southern California Edison, joins the Nexus Podcast to discuss a presentation he gave at the S4 Conference called .  Foster covers the impending risk and host of exposures expected as smart meters and other similar devices are centrally managed online. This scenario gives attackers the ability to attack devices at scale and potentially cause catastrophic damage.  Listen to every episode of the Nexus Podcast here.  ]]></itunes:summary>
    <description><![CDATA[<p>Brian Foster, Senior Advisor for Grid Security at Southern California Edison, joins the Nexus Podcast to discuss a presentation he gave at the S4 Conference called . </p><p>Foster covers the impending risk and host of exposures expected as smart meters and other similar devices are centrally managed online. This scenario gives attackers the ability to attack devices at scale and potentially cause catastrophic damage. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here. </a></p>]]></description>
    <content:encoded><![CDATA[<p>Brian Foster, Senior Advisor for Grid Security at Southern California Edison, joins the Nexus Podcast to discuss a presentation he gave at the S4 Conference called . </p><p>Foster covers the impending risk and host of exposures expected as smart meters and other similar devices are centrally managed online. This scenario gives attackers the ability to attack devices at scale and potentially cause catastrophic damage. </p><p><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here. </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16603010-brian-foster-on-the-risks-of-a-hyperconnected-grid.mp3" length="19662279" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16603010</guid>
    <pubDate>Tue, 11 Feb 2025 13:00:00 -0500</pubDate>
    <podcast:soundbite startTime="391.767" duration="41.0" />
    <itunes:duration>1637</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>89</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISA&#39;s Matthew Rogers on Secure by Demand for OT</itunes:title>
    <title>CISA&#39;s Matthew Rogers on Secure by Demand for OT</title>
    <itunes:summary><![CDATA[Matthew Rogers, ICS Cybersecurity Strategy &amp; R&amp;D Lead at the Cybersecurity &amp; Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.”   This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors.  ...]]></itunes:summary>
    <description><![CDATA[<p>Matthew Rogers, ICS Cybersecurity Strategy &amp; R&amp;D Lead at the Cybersecurity &amp; Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency&apos;s latest publication: <a href='https://www.cisa.gov/sites/default/files/2025-01/joint-guide-secure-by-demand-priority-considerations-for-ot-owners-and-operators-508c.pdf'>“Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.”</a> <br/><br/>This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. <br/><br/><a href='https://claroty.com/blog/secure-by-demand-guide-returns-agency-to-ot-asset-owners'>Read Claroty&apos;s blog on the guide</a>.<br/><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Matthew Rogers, ICS Cybersecurity Strategy &amp; R&amp;D Lead at the Cybersecurity &amp; Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency&apos;s latest publication: <a href='https://www.cisa.gov/sites/default/files/2025-01/joint-guide-secure-by-demand-priority-considerations-for-ot-owners-and-operators-508c.pdf'>“Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.”</a> <br/><br/>This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. <br/><br/><a href='https://claroty.com/blog/secure-by-demand-guide-returns-agency-to-ot-asset-owners'>Read Claroty&apos;s blog on the guide</a>.<br/><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16456765-cisa-s-matthew-rogers-on-secure-by-demand-for-ot.mp3" length="28380485" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16456765</guid>
    <pubDate>Sun, 19 Jan 2025 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="506.883" duration="35.0" />
    <itunes:duration>2363</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>88</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on the IOCONTROL Malware</itunes:title>
    <title>Noam Moshe on the IOCONTROL Malware</title>
    <itunes:summary><![CDATA[Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices.  Read Team82's research blog: "Inside a New OT/IoT Cyberweapon: IONCONTROL" Listen and subscribe to the Nexus Podcast here. ]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices. <br/>Read Team82&apos;s research blog: &quot;<a href='https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol'>Inside a New OT/IoT Cyberweapon: IONCONTROL</a>&quot;<br/><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices. <br/>Read Team82&apos;s research blog: &quot;<a href='https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol'>Inside a New OT/IoT Cyberweapon: IONCONTROL</a>&quot;<br/><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16309246-noam-moshe-on-the-iocontrol-malware.mp3" length="17275493" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16309246</guid>
    <pubDate>Thu, 19 Dec 2024 12:00:00 -0500</pubDate>
    <podcast:soundbite startTime="135.333" duration="33.0" />
    <itunes:duration>1438</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>87</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Team82 on Attacking the Insecure IoT Cloud</itunes:title>
    <title>Team82 on Attacking the Insecure IoT Cloud</title>
    <itunes:summary><![CDATA[Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal n...]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82&apos;s Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team&apos;s latest publication on 10 vulnerabilities discovered in Ruijie Networks&apos; Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.<br/><br/><a href='https://claroty.com/team82/research'>You can find the research here on Team82&apos;s website</a>. <br/><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82&apos;s Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team&apos;s latest publication on 10 vulnerabilities discovered in Ruijie Networks&apos; Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.<br/><br/><a href='https://claroty.com/team82/research'>You can find the research here on Team82&apos;s website</a>. <br/><a href='https://nexusconnect.io/podcasts'>Listen and subscribe to the Nexus Podcast here</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16246919-team82-on-attacking-the-insecure-iot-cloud.mp3" length="22804166" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16246919</guid>
    <pubDate>Fri, 13 Dec 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="557.233" duration="30.0" />
    <itunes:duration>1898</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>86</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Volexity&#39;s Steven Adair on the Nearest Neighbor Attack</itunes:title>
    <title>Volexity&#39;s Steven Adair on the Nearest Neighbor Attack</title>
    <itunes:summary><![CDATA[Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia's APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022.   APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain o...]]></itunes:summary>
    <description><![CDATA[<p>Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia&apos;s APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022. <br/><br/>APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain of breaches and compromises—until they were able to reach their target. <br/><br/><a href='https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/'>Volexity&apos;s blog</a> contains additional technical details. <br/><br/><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia&apos;s APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022. <br/><br/>APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain of breaches and compromises—until they were able to reach their target. <br/><br/><a href='https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/'>Volexity&apos;s blog</a> contains additional technical details. <br/><br/><a href='https://nexusconnect.io/podcasts'>Listen to every episode of the Nexus Podcast here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16234452-volexity-s-steven-adair-on-the-nearest-neighbor-attack.mp3" length="26940419" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16234452</guid>
    <pubDate>Mon, 09 Dec 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="769.417" duration="22.0" />
    <itunes:duration>2243</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>85</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure</itunes:title>
    <title>Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure</title>
    <itunes:summary><![CDATA[Runsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with.  ]]></itunes:summary>
    <description><![CDATA[<p>Runsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with. </p>]]></description>
    <content:encoded><![CDATA[<p>Runsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16055807-joe-saunders-on-advanced-cyberattacks-against-critical-infrastructure.mp3" length="25025151" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16055807</guid>
    <pubDate>Thu, 07 Nov 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1102.733" duration="15.0" />
    <itunes:duration>2083</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>84</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Grant Geyer on the Business Impact of Disruptions from Cyberattacks</itunes:title>
    <title>Grant Geyer on the Business Impact of Disruptions from Cyberattacks</title>
    <itunes:summary><![CDATA[Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems.   The financial losses are steep from these attacks impacting connected systems that are so central to our way of life, as are the recovery costs and operational impacts such as downtime, which is often intolerable in critical industries such as manufacturing and...]]></itunes:summary>
    <description><![CDATA[<p>Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. <br/><br/>The financial losses are steep from these attacks impacting connected systems that are so central to our way of life, as are the recovery costs and operational impacts such as downtime, which is often intolerable in critical industries such as manufacturing and healthcare.<br/><br/>Geyer brings his unique insights to the discussions, including attackers&apos; motivations in targeting CPS, why ransomware continues to impact healthcare delivery organizations, and the risks of unsecured third-party and supply chain connections to the enterprise.  <br/><br/><a href='https://claroty.com/resources/reports/the-global-state-of-cps-security-2024-business-impact-of-disruptions'>Get the full survey results here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. <br/><br/>The financial losses are steep from these attacks impacting connected systems that are so central to our way of life, as are the recovery costs and operational impacts such as downtime, which is often intolerable in critical industries such as manufacturing and healthcare.<br/><br/>Geyer brings his unique insights to the discussions, including attackers&apos; motivations in targeting CPS, why ransomware continues to impact healthcare delivery organizations, and the risks of unsecured third-party and supply chain connections to the enterprise.  <br/><br/><a href='https://claroty.com/resources/reports/the-global-state-of-cps-security-2024-business-impact-of-disruptions'>Get the full survey results here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/16005345-grant-geyer-on-the-business-impact-of-disruptions-from-cyberattacks.mp3" length="18062365" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16005345</guid>
    <pubDate>Mon, 28 Oct 2024 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="389.833" duration="29.5" />
    <itunes:duration>1503</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>83</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Alethe Denis on Social Engineering, Red-Teaming</itunes:title>
    <title>Alethe Denis on Social Engineering, Red-Teaming</title>
    <itunes:summary><![CDATA[Bishop Fox senior security consultant Alethe Denis joins the Claroty Nexus podcast to discuss social engineering in cybersecurity and how it has become part of red-team engagements, especially inside critical infrastructure organizations. She explains the value of open source intelligence and data stolen in breaches to scammers and extortionists in creating pretexts for their schemes. She also explains how to best defend against these tactics that aid threat actors in weaponizing personal inf...]]></itunes:summary>
    <description><![CDATA[<p>Bishop Fox senior security consultant Alethe Denis joins the Claroty Nexus podcast to discuss social engineering in cybersecurity and how it has become part of red-team engagements, especially inside critical infrastructure organizations. She explains the value of open source intelligence and data stolen in breaches to scammers and extortionists in creating pretexts for their schemes. She also explains how to best defend against these tactics that aid threat actors in weaponizing personal information against victims and organizations. <br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Bishop Fox senior security consultant Alethe Denis joins the Claroty Nexus podcast to discuss social engineering in cybersecurity and how it has become part of red-team engagements, especially inside critical infrastructure organizations. She explains the value of open source intelligence and data stolen in breaches to scammers and extortionists in creating pretexts for their schemes. She also explains how to best defend against these tactics that aid threat actors in weaponizing personal information against victims and organizations. <br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15620365-alethe-denis-on-social-engineering-red-teaming.mp3" length="31526462" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15620365</guid>
    <pubDate>Mon, 26 Aug 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1419.567" duration="29.5" />
    <itunes:duration>2625</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>82</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Alon Dankner on Extracting Crypto Keys from PLCs</itunes:title>
    <title>Alon Dankner on Extracting Crypto Keys from PLCs</title>
    <itunes:summary><![CDATA[Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir's presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an att...]]></itunes:summary>
    <description><![CDATA[<p>Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir&apos;s presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system.<br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir&apos;s presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system.<br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15605446-alon-dankner-on-extracting-crypto-keys-from-plcs.mp3" length="20164766" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15605446</guid>
    <pubDate>Mon, 19 Aug 2024 09:00:00 -0400</pubDate>
    <podcast:soundbite startTime="692.833" duration="18.5" />
    <itunes:duration>1678</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>81</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on Extracting Forensic Data from Unitronics PLCs</itunes:title>
    <title>Noam Moshe on Extracting Forensic Data from Unitronics PLCs</title>
    <itunes:summary><![CDATA[Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to talk about Team82’s research into Unitronics Vision series integrated HMI/PLC devices. The OT devices were exploited last year in attacks against water treatment facilities in the U.S. and Israel. Team82 researched the security of these devices and developed a pair of tools that allowed them to extract forensic information from the PLCs. Both tools were released to open source on Team82’s Github page. Moshe also presented this re...]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to talk about Team82’s research into Unitronics Vision series integrated HMI/PLC devices. The OT devices were exploited last year in attacks against water treatment facilities in the U.S. and Israel. Team82 researched the security of these devices and developed a pair of tools that allowed them to extract forensic information from the PLCs. Both tools were released to open source on Team82’s Github page.<br/>Moshe also presented this research today at the Black Hat Briefings in Las Vegas. </p><p><a href='https://claroty.com/team82/research/from-exploits-to-forensics-unraveling-the-unitronics-attack'>Read Team82’s research blog here.</a><br/><a href='https://github.com/claroty/PCOM-Tools'>Download the forensics tools here.</a><br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a> </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to talk about Team82’s research into Unitronics Vision series integrated HMI/PLC devices. The OT devices were exploited last year in attacks against water treatment facilities in the U.S. and Israel. Team82 researched the security of these devices and developed a pair of tools that allowed them to extract forensic information from the PLCs. Both tools were released to open source on Team82’s Github page.<br/>Moshe also presented this research today at the Black Hat Briefings in Las Vegas. </p><p><a href='https://claroty.com/team82/research/from-exploits-to-forensics-unraveling-the-unitronics-attack'>Read Team82’s research blog here.</a><br/><a href='https://github.com/claroty/PCOM-Tools'>Download the forensics tools here.</a><br/>For more, visit <a href='http://nexusconnect.io/podcasts'>nexusconnect.io/podcasts</a> </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15549009-noam-moshe-on-extracting-forensic-data-from-unitronics-plcs.mp3" length="20082659" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15549009</guid>
    <pubDate>Wed, 07 Aug 2024 21:00:00 -0400</pubDate>
    <podcast:soundbite startTime="685.017" duration="35.0" />
    <itunes:duration>1672</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>80</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Alexander Antukh on Cyber Risk Quantification</itunes:title>
    <title>Alexander Antukh on Cyber Risk Quantification</title>
    <itunes:summary><![CDATA[Alexander Antukh, CISO of AboitizPower in the Philippines, the country's largest power and renewable energy provider, joins the Nexus Podcast to discuss cyber risk quantification (CRQ). CRQ is a popular framework used to assess the financial impact of a cybersecurity threat on an organization. Antukh is an advocate of CRQ, and discusses his approach to using it to predict risk in his organization, what level of organizational maturity is required for this approach to succeed, and how it's bei...]]></itunes:summary>
    <description><![CDATA[<p>Alexander Antukh, CISO of AboitizPower in the Philippines, the country&apos;s largest power and renewable energy provider, joins the Nexus Podcast to discuss cyber risk quantification (CRQ). CRQ is a popular framework used to assess the financial impact of a cybersecurity threat on an organization. Antukh is an advocate of CRQ, and discusses his approach to using it to predict risk in his organization, what level of organizational maturity is required for this approach to succeed, and how it&apos;s being applied in operational technology (OT) environments. <br/> <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Alexander Antukh, CISO of AboitizPower in the Philippines, the country&apos;s largest power and renewable energy provider, joins the Nexus Podcast to discuss cyber risk quantification (CRQ). CRQ is a popular framework used to assess the financial impact of a cybersecurity threat on an organization. Antukh is an advocate of CRQ, and discusses his approach to using it to predict risk in his organization, what level of organizational maturity is required for this approach to succeed, and how it&apos;s being applied in operational technology (OT) environments. <br/> <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15508749-alexander-antukh-on-cyber-risk-quantification.mp3" length="31045596" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15508749</guid>
    <pubDate>Thu, 01 Aug 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="464.767" duration="15.0" />
    <itunes:duration>2585</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>79</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vincente Diaz on Using AI for Malware Analysis</itunes:title>
    <title>Vincente Diaz on Using AI for Malware Analysis</title>
    <itunes:summary><![CDATA[Vincente Diaz, Threat Intelligence Strategist on Google’s VirusTotal team and formerly the EU director of Kaspersky Lab’s Global Research &amp; Analysis Team, joins the Nexus Podcast to discuss how artificial intelligence and machine learning is an integral part of what VirusTotal is doing around malware analysis. Vincente describes the advantages these advanced technologies bring to malware analysis, in particular how it cuts down analysis time, and improves exploit detection.  For more...]]></itunes:summary>
    <description><![CDATA[<p>Vincente Diaz, Threat Intelligence Strategist on Google’s VirusTotal team and formerly the EU director of Kaspersky Lab’s Global Research &amp; Analysis Team, joins the Nexus Podcast to discuss how artificial intelligence and machine learning is an integral part of what VirusTotal is doing around malware analysis. Vincente describes the advantages these advanced technologies bring to malware analysis, in particular how it cuts down analysis time, and improves exploit detection. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Vincente Diaz, Threat Intelligence Strategist on Google’s VirusTotal team and formerly the EU director of Kaspersky Lab’s Global Research &amp; Analysis Team, joins the Nexus Podcast to discuss how artificial intelligence and machine learning is an integral part of what VirusTotal is doing around malware analysis. Vincente describes the advantages these advanced technologies bring to malware analysis, in particular how it cuts down analysis time, and improves exploit detection. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15424994-vincente-diaz-on-using-ai-for-malware-analysis.mp3" length="19922137" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15424994</guid>
    <pubDate>Sun, 21 Jul 2024 18:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1134.583" duration="16.0" />
    <itunes:duration>1658</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>78</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ahmik Hindman on Patching OT and ICS</itunes:title>
    <title>Ahmik Hindman on Patching OT and ICS</title>
    <itunes:summary><![CDATA[Ahmik Hindman, Senior Network and Security Solution Consultant at Rockwell Automation, joins the Claroty Nexus podcast to discuss the challenges and success stories he's experienced in patching operational technology equipment and industrial control systems. Hindman has been at Rockwell Automation for 28 years and has expansive experience with customers solving these complex cybersecurity issues. Hindman shares some of the frameworks, tools, and approaches he's worked with, and how convergenc...]]></itunes:summary>
    <description><![CDATA[<p>Ahmik Hindman, Senior Network and Security Solution Consultant at Rockwell Automation, joins the Claroty Nexus podcast to discuss the challenges and success stories he&apos;s experienced in patching operational technology equipment and industrial control systems. Hindman has been at Rockwell Automation for 28 years and has expansive experience with customers solving these complex cybersecurity issues. Hindman shares some of the frameworks, tools, and approaches he&apos;s worked with, and how convergence and other recent trends have changed how organizations handle vulnerabilities. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Ahmik Hindman, Senior Network and Security Solution Consultant at Rockwell Automation, joins the Claroty Nexus podcast to discuss the challenges and success stories he&apos;s experienced in patching operational technology equipment and industrial control systems. Hindman has been at Rockwell Automation for 28 years and has expansive experience with customers solving these complex cybersecurity issues. Hindman shares some of the frameworks, tools, and approaches he&apos;s worked with, and how convergence and other recent trends have changed how organizations handle vulnerabilities. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15357561-ahmik-hindman-on-patching-ot-and-ics.mp3" length="20380409" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15357561</guid>
    <pubDate>Mon, 08 Jul 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="770.517" duration="33.5" />
    <itunes:duration>1696</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>77</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dr. Bilyana Lilly on Information Warfare</itunes:title>
    <title>Dr. Bilyana Lilly on Information Warfare</title>
    <itunes:summary><![CDATA[Dr. Bilyana Lilly,  an expert on geopolitics and Russia’s codification of information warfare as a strategy, says that the war in Ukraine has only temporarily delayed Russia’s activity against the West in cyberspace. On this episode of the Nexus podcast, she reinforces the idea that despite the fact that Russia is operating under severe resource constraints, CISOs should be preparing for the inevitable.   “I think it’s important to identify the conditions and the constraints that cu...]]></itunes:summary>
    <description><![CDATA[<p><a href='https://nexusconnect.io/videos/dr-bilyana-lilly-on-russian-misinformation-campaigns'>Dr. Bilyana Lilly</a>,  an expert on geopolitics and Russia’s codification of information warfare as a strategy, says that the war in Ukraine has only temporarily delayed Russia’s activity against the West in cyberspace. On this episode of the Nexus podcast, she reinforces the idea that despite the fact that Russia is operating under severe resource constraints, CISOs should be preparing for the inevitable. <br/><br/>“I think it’s important to identify the conditions and the constraints that currently the Russian government is currently experiencing. Because once these constraints are lifted then I think we’ll see an increase in cyber activity, which gives us some time to prepare,” Lilly said. “That’s what I think we should be doing right now. I think we shouldn’t be letting our guard down because I think those attacks are coming.”<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p><a href='https://nexusconnect.io/videos/dr-bilyana-lilly-on-russian-misinformation-campaigns'>Dr. Bilyana Lilly</a>,  an expert on geopolitics and Russia’s codification of information warfare as a strategy, says that the war in Ukraine has only temporarily delayed Russia’s activity against the West in cyberspace. On this episode of the Nexus podcast, she reinforces the idea that despite the fact that Russia is operating under severe resource constraints, CISOs should be preparing for the inevitable. <br/><br/>“I think it’s important to identify the conditions and the constraints that currently the Russian government is currently experiencing. Because once these constraints are lifted then I think we’ll see an increase in cyber activity, which gives us some time to prepare,” Lilly said. “That’s what I think we should be doing right now. I think we shouldn’t be letting our guard down because I think those attacks are coming.”<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15328301-dr-bilyana-lilly-on-information-warfare.mp3" length="20050647" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15328301</guid>
    <pubDate>Mon, 01 Jul 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="846.683" duration="15.5" />
    <itunes:duration>1669</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>76</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vinnie Liu on Offensive Security Testing During Incidents</itunes:title>
    <title>Vinnie Liu on Offensive Security Testing During Incidents</title>
    <itunes:summary><![CDATA[Bishop Fox CEO and Cofounder Vinnie Liu joins the Nexus Podcast to discuss his team's role during security incidents in conducting offensive security testing alongside incident response activities. In healthcare environments where ransomware is the leading threat, red-teams and other offensive security specialists are called in, Liu said, to ensure that secondary attack vectors cannot be leveraged by attackers to maintain persistence inside an organization.  For more, visit nexusconnect....]]></itunes:summary>
    <description><![CDATA[<p>Bishop Fox CEO and Cofounder Vinnie Liu joins the Nexus Podcast to discuss his team&apos;s role during security incidents in conducting offensive security testing alongside incident response activities. In healthcare environments where ransomware is the leading threat, red-teams and other offensive security specialists are called in, Liu said, to ensure that secondary attack vectors cannot be leveraged by attackers to maintain persistence inside an organization. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Bishop Fox CEO and Cofounder Vinnie Liu joins the Nexus Podcast to discuss his team&apos;s role during security incidents in conducting offensive security testing alongside incident response activities. In healthcare environments where ransomware is the leading threat, red-teams and other offensive security specialists are called in, Liu said, to ensure that secondary attack vectors cannot be leveraged by attackers to maintain persistence inside an organization. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15208246-vinnie-liu-on-offensive-security-testing-during-incidents.mp3" length="21261613" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15208246</guid>
    <pubDate>Mon, 10 Jun 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="483.35" duration="29.0" />
    <itunes:duration>1770</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>75</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Diana Kelley on Protecting the AI Lifecycle</itunes:title>
    <title>Diana Kelley on Protecting the AI Lifecycle</title>
    <itunes:summary><![CDATA[Protect AI Chief Information Security Officer Diana Kelley joins the Claroty Nexus podcast to discuss the intricacies of securing machine learning and artificial intelligence use inside the enterprise. She also explains the concept of MLSecOps and how it compares and contrasts to DevOps used in application development.  For more, visit nexusconnect.io/podcasts ]]></itunes:summary>
    <description><![CDATA[<p>Protect AI Chief Information Security Officer Diana Kelley joins the Claroty Nexus podcast to discuss the intricacies of securing machine learning and artificial intelligence use inside the enterprise. She also explains the concept of MLSecOps and how it compares and contrasts to DevOps used in application development. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Protect AI Chief Information Security Officer Diana Kelley joins the Claroty Nexus podcast to discuss the intricacies of securing machine learning and artificial intelligence use inside the enterprise. She also explains the concept of MLSecOps and how it compares and contrasts to DevOps used in application development. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15171344-diana-kelley-on-protecting-the-ai-lifecycle.mp3" length="18871381" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15171344</guid>
    <pubDate>Mon, 03 Jun 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="572.783" duration="16.5" />
    <itunes:duration>1571</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>74</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jennifer Minella on OT Cybersecurity Convergence </itunes:title>
    <title>Jennifer Minella on OT Cybersecurity Convergence </title>
    <itunes:summary><![CDATA[Jennifer Minella, founder and principal advisor of Viszen Security,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist.  For more, vi...]]></itunes:summary>
    <description><![CDATA[<p>Jennifer Minella, founder and principal advisor of <a href='https://www.viszensecurity.com/'>Viszen Security</a>,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Jennifer Minella, founder and principal advisor of <a href='https://www.viszensecurity.com/'>Viszen Security</a>,  joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15123534-jennifer-minella-on-ot-cybersecurity-convergence.mp3" length="21573813" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15123534</guid>
    <pubDate>Tue, 28 May 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="899.0" duration="47.0" />
    <itunes:duration>1796</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>73</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Charles Blauner on the Changing Role of the CISO</itunes:title>
    <title>Charles Blauner on the Changing Role of the CISO</title>
    <itunes:summary><![CDATA[Charles Blauner, Team8 operating partner and CISO in residence, joins the Claroty Nexus podcast to discuss the rapid changes in responsibilities and liability risks facing today's chief information security officers. Blauner, former CISO at JP Morgan and Deutsche Bank, describes how, for example, the new SEC rules around disclosures and incidents, along with legal action against high-profile CISOs of public companies, have some security leaders re-thinking how they operate and negotiate withi...]]></itunes:summary>
    <description><![CDATA[<p>Charles Blauner, Team8 operating partner and CISO in residence, joins the Claroty Nexus podcast to discuss the rapid changes in responsibilities and liability risks facing today&apos;s chief information security officers. Blauner, former CISO at JP Morgan and Deutsche Bank, describes how, for example, the new SEC rules around disclosures and incidents, along with legal action against high-profile CISOs of public companies, have some security leaders re-thinking how they operate and negotiate within their roles. He also discusses whether enterprises should brace for an exodus of those in the CISO chair today. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Charles Blauner, Team8 operating partner and CISO in residence, joins the Claroty Nexus podcast to discuss the rapid changes in responsibilities and liability risks facing today&apos;s chief information security officers. Blauner, former CISO at JP Morgan and Deutsche Bank, describes how, for example, the new SEC rules around disclosures and incidents, along with legal action against high-profile CISOs of public companies, have some security leaders re-thinking how they operate and negotiate within their roles. He also discusses whether enterprises should brace for an exodus of those in the CISO chair today. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15080845-charles-blauner-on-the-changing-role-of-the-ciso.mp3" length="22348707" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15080845</guid>
    <pubDate>Mon, 20 May 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1210.75" duration="47.5" />
    <itunes:duration>1860</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>72</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mikko Hypponen on a Decade of Corporate Ransomware Attacks</itunes:title>
    <title>Mikko Hypponen on a Decade of Corporate Ransomware Attacks</title>
    <itunes:summary><![CDATA[Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today's enormously profitable ransomware services and gangs .  For more, visit nexusconnect.io/podcasts ]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today&apos;s enormously profitable ransomware services and gangs . <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today&apos;s enormously profitable ransomware services and gangs . <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15045664-mikko-hypponen-on-a-decade-of-corporate-ransomware-attacks.mp3" length="23278477" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15045664</guid>
    <pubDate>Mon, 13 May 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="353.583" duration="28.0" />
    <itunes:duration>1938</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>71</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Adm. Michael Rogers on Geopolitics and Cybersecurity</itunes:title>
    <title>Adm. Michael Rogers on Geopolitics and Cybersecurity</title>
    <itunes:summary><![CDATA[Former NSA Director Adm. Michael S. Rogers (Ret. USN) joins the Claroty Nexus Podcast live from RSA Conference in San Francisco to discuss the current geopolitical climate, its impact on chief information security officers, and how they can and should response. Rogers discusses how the doctrines of adversaries are changing and that U.S. critical infrastructure is increasingly in the crosshairs. He also brings his experience and delivers practical advice for CISOs who are not only dealing with...]]></itunes:summary>
    <description><![CDATA[<p>Former NSA Director Adm. Michael S. Rogers (Ret. USN) joins the Claroty Nexus Podcast live from RSA Conference in San Francisco to discuss the current geopolitical climate, its impact on chief information security officers, and how they can and should response. Rogers discusses how the doctrines of adversaries are changing and that U.S. critical infrastructure is increasingly in the crosshairs. He also brings his experience and delivers practical advice for CISOs who are not only dealing with external adversaries but also potential legal liability in the event of breaches.<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Former NSA Director Adm. Michael S. Rogers (Ret. USN) joins the Claroty Nexus Podcast live from RSA Conference in San Francisco to discuss the current geopolitical climate, its impact on chief information security officers, and how they can and should response. Rogers discusses how the doctrines of adversaries are changing and that U.S. critical infrastructure is increasingly in the crosshairs. He also brings his experience and delivers practical advice for CISOs who are not only dealing with external adversaries but also potential legal liability in the event of breaches.<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/15038068-adm-michael-rogers-on-geopolitics-and-cybersecurity.mp3" length="20148474" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15038068</guid>
    <pubDate>Thu, 09 May 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1036.633" duration="24.5" />
    <itunes:duration>1677</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>70</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Abel Archundia on Complexity in Critical Infrastructure </itunes:title>
    <title>Abel Archundia on Complexity in Critical Infrastructure </title>
    <itunes:summary><![CDATA[Abel Archundia, chief technology officer and global head of advisory for Istari, joins the Claroty Nexus podcast to discuss the nature of complexity, technical debt, and regulation, and how it influences risk decisions in critical infrastructure environments. He explains the challenges complexity brings to manufacturing, pharmaceuticals, and other CI sectors, and how owners and operators may feel outmatched by technical debt.  For more, visit nexusconnect.io/podcasts ]]></itunes:summary>
    <description><![CDATA[<p>Abel Archundia, chief technology officer and global head of advisory for Istari, joins the Claroty Nexus podcast to discuss the nature of complexity, technical debt, and regulation, and how it influences risk decisions in critical infrastructure environments. He explains the challenges complexity brings to manufacturing, pharmaceuticals, and other CI sectors, and how owners and operators may feel outmatched by technical debt. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Abel Archundia, chief technology officer and global head of advisory for Istari, joins the Claroty Nexus podcast to discuss the nature of complexity, technical debt, and regulation, and how it influences risk decisions in critical infrastructure environments. He explains the challenges complexity brings to manufacturing, pharmaceuticals, and other CI sectors, and how owners and operators may feel outmatched by technical debt. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14956260-abel-archundia-on-complexity-in-critical-infrastructure.mp3" length="25662722" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14956260</guid>
    <pubDate>Mon, 29 Apr 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1672.633" duration="23.5" />
    <itunes:duration>2137</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>69</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Adam Gluck on Industrial DevOps</itunes:title>
    <title>Adam Gluck on Industrial DevOps</title>
    <itunes:summary><![CDATA[Adam Gluck, founder and CEO of Copia Automation, joins the Claroty Nexus podcast to discuss the need for DevOps within industrial automation. DevOps practices are popping up more frequently in these environments, but there are still hurdles and challenges for developers and engineers to overcome. Adam covers those, and explains how DevOps can improve disaster recovery, lessen the introduction of vulnerabilities in new code, and mitigate risk by being proactive about reviewing code changes as ...]]></itunes:summary>
    <description><![CDATA[<p>Adam Gluck, founder and CEO of Copia Automation, joins the Claroty Nexus podcast to discuss the need for DevOps within industrial automation. DevOps practices are popping up more frequently in these environments, but there are still hurdles and challenges for developers and engineers to overcome. Adam covers those, and explains how DevOps can improve disaster recovery, lessen the introduction of vulnerabilities in new code, and mitigate risk by being proactive about reviewing code changes as they happen rather than later in the development lifecycle. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Adam Gluck, founder and CEO of Copia Automation, joins the Claroty Nexus podcast to discuss the need for DevOps within industrial automation. DevOps practices are popping up more frequently in these environments, but there are still hurdles and challenges for developers and engineers to overcome. Adam covers those, and explains how DevOps can improve disaster recovery, lessen the introduction of vulnerabilities in new code, and mitigate risk by being proactive about reviewing code changes as they happen rather than later in the development lifecycle. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14942394-adam-gluck-on-industrial-devops.mp3" length="26714048" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14942394</guid>
    <pubDate>Tue, 23 Apr 2024 18:00:00 -0400</pubDate>
    <podcast:soundbite startTime="822.017" duration="36.5" />
    <itunes:duration>2224</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>68</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Greg Garcia on the Change Healthcare Cyberattack</itunes:title>
    <title>Greg Garcia on the Change Healthcare Cyberattack</title>
    <itunes:summary><![CDATA[Greg Garcia, the executive director of the Healthcare and Public Health Sector Coordinating Council’s Cybersecurity Working Group, joins the Claroty Nexus podcast to discuss the Change Healthcare ransomware attack and what can be done from a policy perspective to minimize the impact of such attacks in the future.  Garcia has had a long career on the policy side of cybersecurity, and was the first presidentially appointed Assistant Secretary for Cybersecurity at the Department of Homeland Secu...]]></itunes:summary>
    <description><![CDATA[<p>Greg Garcia, the executive director of the Healthcare and Public Health Sector Coordinating Council’s Cybersecurity Working Group, joins the Claroty Nexus podcast to discuss the Change Healthcare ransomware attack and what can be done from a policy perspective to minimize the impact of such attacks in the future.<br/><br/>Garcia has had a long career on the policy side of cybersecurity, and was the first presidentially appointed Assistant Secretary for Cybersecurity at the Department of Homeland Security. In this episode, he discusses where organizations are in terms of recovery from the impacts of the attack, longterm impacts on the healthcare sector, and how the HSCC&apos;s recently published <a href='https://healthsectorcouncil.org/wp-content/uploads/2024/02/Health-Industry-Cybersecurity-Strategic-Plan-2024-2029.pdf'>five-year strategic plan</a> for organizations in the crosshairs. </p><p><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Greg Garcia, the executive director of the Healthcare and Public Health Sector Coordinating Council’s Cybersecurity Working Group, joins the Claroty Nexus podcast to discuss the Change Healthcare ransomware attack and what can be done from a policy perspective to minimize the impact of such attacks in the future.<br/><br/>Garcia has had a long career on the policy side of cybersecurity, and was the first presidentially appointed Assistant Secretary for Cybersecurity at the Department of Homeland Security. In this episode, he discusses where organizations are in terms of recovery from the impacts of the attack, longterm impacts on the healthcare sector, and how the HSCC&apos;s recently published <a href='https://healthsectorcouncil.org/wp-content/uploads/2024/02/Health-Industry-Cybersecurity-Strategic-Plan-2024-2029.pdf'>five-year strategic plan</a> for organizations in the crosshairs. </p><p><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14808608-greg-garcia-on-the-change-healthcare-cyberattack.mp3" length="32127717" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14808608</guid>
    <pubDate>Tue, 02 Apr 2024 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1096.4" duration="42.0" />
    <itunes:duration>2675</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>67</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ryan Pickren on New Web-Based PLC Malware Research</itunes:title>
    <title>Ryan Pickren on New Web-Based PLC Malware Research</title>
    <itunes:summary><![CDATA[Ryan Pickren, a Ph.D. student in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, joins the Claroty Nexus podcast to discuss a recently published research paper that explains a new web-based malware attack against programmable logic controllers. Pickren, the lead author, along with colleagues Tohid Shekari, Saman Zonouz, and Raheem Beyah, explains how embedded webservers inside modern PLCs can be attacked to give remote attackers full control over the ...]]></itunes:summary>
    <description><![CDATA[<p>Ryan Pickren, a Ph.D. student in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, joins the Claroty Nexus podcast to discuss a recently published research paper that explains a new web-based malware attack against programmable logic controllers. Pickren, the lead author, along with colleagues Tohid Shekari, Saman Zonouz, and Raheem Beyah, explains how embedded webservers inside modern PLCs can be attacked to give remote attackers full control over the device. <br/>Check out their paper: <a href='https://www.ndss-symposium.org/wp-content/uploads/2024-49-paper.pdf'>“Compromising Industrial Processes Using Web-Based Programmable Logic Controller Malware”</a><br/><br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Ryan Pickren, a Ph.D. student in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, joins the Claroty Nexus podcast to discuss a recently published research paper that explains a new web-based malware attack against programmable logic controllers. Pickren, the lead author, along with colleagues Tohid Shekari, Saman Zonouz, and Raheem Beyah, explains how embedded webservers inside modern PLCs can be attacked to give remote attackers full control over the device. <br/>Check out their paper: <a href='https://www.ndss-symposium.org/wp-content/uploads/2024-49-paper.pdf'>“Compromising Industrial Processes Using Web-Based Programmable Logic Controller Malware”</a><br/><br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14639635-ryan-pickren-on-new-web-based-plc-malware-research.mp3" length="25430761" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14639635</guid>
    <pubDate>Wed, 06 Mar 2024 15:00:00 -0500</pubDate>
    <podcast:soundbite startTime="601.567" duration="28.0" />
    <itunes:duration>2117</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>66</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mike Rogers on Understanding a CISO&#39;s Personal Exposure in Cyber Incidents</itunes:title>
    <title>Mike Rogers on Understanding a CISO&#39;s Personal Exposure in Cyber Incidents</title>
    <itunes:summary><![CDATA[Hormel Foods Chief Information Security Officer and Director of Information Security and Compliance Mike Rogers joins the Claroty Nexus podcast to discuss why it's so important for CISO's to understand their personal liability during cybersecurity incidents. New regulations, including the SEC's cybersecurity rules, are driving this need for security leadership to evaluate to manage their personal exposure. Rogers provides his perspective on the SEC rules, how incident response is changing, an...]]></itunes:summary>
    <description><![CDATA[<p>Hormel Foods Chief Information Security Officer and Director of Information Security and Compliance Mike Rogers joins the Claroty Nexus podcast to discuss why it&apos;s so important for CISO&apos;s to understand their personal liability during cybersecurity incidents. New regulations, including the SEC&apos;s cybersecurity rules, are driving this need for security leadership to evaluate to manage their personal exposure. Rogers provides his perspective on the SEC rules, how incident response is changing, and the ambiguity around exactly what constitutes a &quot;material&quot; incident.<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Hormel Foods Chief Information Security Officer and Director of Information Security and Compliance Mike Rogers joins the Claroty Nexus podcast to discuss why it&apos;s so important for CISO&apos;s to understand their personal liability during cybersecurity incidents. New regulations, including the SEC&apos;s cybersecurity rules, are driving this need for security leadership to evaluate to manage their personal exposure. Rogers provides his perspective on the SEC rules, how incident response is changing, and the ambiguity around exactly what constitutes a &quot;material&quot; incident.<br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14496682-mike-rogers-on-understanding-a-ciso-s-personal-exposure-in-cyber-incidents.mp3" length="26969630" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14496682</guid>
    <pubDate>Wed, 14 Feb 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="299.017" duration="23.0" />
    <itunes:duration>2246</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>65</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Team82 Answers More of your OT Cybersecurity Questions</itunes:title>
    <title>Team82 Answers More of your OT Cybersecurity Questions</title>
    <itunes:summary><![CDATA[Noam Moshe of Claroty Team82 is back to answer more listener questions about OT vulnerability research, threats and risks to OT networks and IoT devices, and the best mitigation and remediation strategies for defenders.  This is a follow-up podcast to an episode we recorded in December answering listener questions. You can listen to that episode here.  For more, visit nexusconnect.io/podcasts ]]></itunes:summary>
    <description><![CDATA[<p>Noam Moshe of Claroty Team82 is back to answer more listener questions about OT vulnerability research, threats and risks to OT networks and IoT devices, and the best mitigation and remediation strategies for defenders. <br/>This is a follow-up podcast to an episode we recorded in December answering listener questions. <a href='https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-your-questions'>You can listen to that episode here.</a><br/><br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Noam Moshe of Claroty Team82 is back to answer more listener questions about OT vulnerability research, threats and risks to OT networks and IoT devices, and the best mitigation and remediation strategies for defenders. <br/>This is a follow-up podcast to an episode we recorded in December answering listener questions. <a href='https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-your-questions'>You can listen to that episode here.</a><br/><br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14368760-team82-answers-more-of-your-ot-cybersecurity-questions.mp3" length="23034609" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14368760</guid>
    <pubDate>Thu, 25 Jan 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="966.0" duration="38.0" />
    <itunes:duration>1918</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>64</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Juan Piacquadio on Securing Pharma 4.0</itunes:title>
    <title>Juan Piacquadio on Securing Pharma 4.0</title>
    <itunes:summary><![CDATA[Phlow Corp., CIO Juan Piacquadio joins the Claroty Nexus podcast to discuss the application of Industry 4.0 to pharmaceuticals, also known as Pharma 4.0. The industry is quickly adopting advanced technologies such as artificial intelligence, digital twins, and augmented reality to enhance the development of medicine and improve patient care. Along with that expansion of capabilities comes a wider attack surface, and Piacquadio spends a good deal of time explaining not only the threat landscap...]]></itunes:summary>
    <description><![CDATA[<p>Phlow Corp., CIO Juan Piacquadio joins the Claroty Nexus podcast to discuss the application of Industry 4.0 to pharmaceuticals, also known as Pharma 4.0. The industry is quickly adopting advanced technologies such as artificial intelligence, digital twins, and augmented reality to enhance the development of medicine and improve patient care. Along with that expansion of capabilities comes a wider attack surface, and Piacquadio spends a good deal of time explaining not only the threat landscape he envisions, but also how giant pharmaceuticals, the supply chain, and security providers must respond. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>Phlow Corp., CIO Juan Piacquadio joins the Claroty Nexus podcast to discuss the application of Industry 4.0 to pharmaceuticals, also known as Pharma 4.0. The industry is quickly adopting advanced technologies such as artificial intelligence, digital twins, and augmented reality to enhance the development of medicine and improve patient care. Along with that expansion of capabilities comes a wider attack surface, and Piacquadio spends a good deal of time explaining not only the threat landscape he envisions, but also how giant pharmaceuticals, the supply chain, and security providers must respond. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14271412-juan-piacquadio-on-securing-pharma-4-0.mp3" length="34172144" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14271412</guid>
    <pubDate>Wed, 10 Jan 2024 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="768.083" duration="39.5" />
    <itunes:duration>2846</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>63</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>David Elfering on CISOs and Cyber Liability Insurance</itunes:title>
    <title>David Elfering on CISOs and Cyber Liability Insurance</title>
    <itunes:summary><![CDATA[David Elfering, CISO at Carrix and former security and risk executive at Marsh, is back for another episode of the Claroty Nexus podcast to discuss cyber liability insurance. Elfering has extensive experience working not only as an enterprise cybersecurity executive, but also with one of the world's leading insurance carriers. Listen as he brings insight on that perspective, how carrier cybersecurity requirements align with risk reduction, red flags that can imperil coverage or claims, and ho...]]></itunes:summary>
    <description><![CDATA[<p>David Elfering, CISO at Carrix and former security and risk executive at Marsh, is back for another episode of the Claroty Nexus podcast to discuss cyber liability insurance. Elfering has extensive experience working not only as an enterprise cybersecurity executive, but also with one of the world&apos;s leading insurance carriers. Listen as he brings insight on that perspective, how carrier cybersecurity requirements align with risk reduction, red flags that can imperil coverage or claims, and how cyber insurance providers are looking at geopolitical conflict. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>David Elfering, CISO at Carrix and former security and risk executive at Marsh, is back for another episode of the Claroty Nexus podcast to discuss cyber liability insurance. Elfering has extensive experience working not only as an enterprise cybersecurity executive, but also with one of the world&apos;s leading insurance carriers. Listen as he brings insight on that perspective, how carrier cybersecurity requirements align with risk reduction, red flags that can imperil coverage or claims, and how cyber insurance providers are looking at geopolitical conflict. <br/><b>For more, visit </b><a href='http://nexusconnect.io/podcasts'><b>nexusconnect.io/podcasts</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14243456-david-elfering-on-cisos-and-cyber-liability-insurance.mp3" length="31927420" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14243456</guid>
    <pubDate>Thu, 04 Jan 2024 05:00:00 -0500</pubDate>
    <podcast:soundbite startTime="661.0" duration="28.5" />
    <itunes:duration>2659</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>62</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Team82 Answers Your Vulnerability Research Questions</itunes:title>
    <title>Team82 Answers Your Vulnerability Research Questions</title>
    <itunes:summary><![CDATA[Team82 researchers Sharon Brizinov and Noam Moshe join the Claroty podcast for a special episode where they answer questions submitted by users. This Ask-Me-Anything style of podcast covers the team's OT and IoT vulnerability research process, resources for experienced and beginner vulnerability researchers, and insights from their point of view on the threat landscape for cyber-physical systems.  ]]></itunes:summary>
    <description><![CDATA[<p>Team82 researchers Sharon Brizinov and Noam Moshe join the Claroty podcast for a special episode where they answer questions submitted by users. This Ask-Me-Anything style of podcast covers the team&apos;s OT and IoT vulnerability research process, resources for experienced and beginner vulnerability researchers, and insights from their point of view on the threat landscape for cyber-physical systems. </p>]]></description>
    <content:encoded><![CDATA[<p>Team82 researchers Sharon Brizinov and Noam Moshe join the Claroty podcast for a special episode where they answer questions submitted by users. This Ask-Me-Anything style of podcast covers the team&apos;s OT and IoT vulnerability research process, resources for experienced and beginner vulnerability researchers, and insights from their point of view on the threat landscape for cyber-physical systems. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/14099662-team82-answers-your-vulnerability-research-questions.mp3" length="20745359" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14099662</guid>
    <pubDate>Wed, 06 Dec 2023 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="530.833" duration="31.5" />
    <itunes:duration>1727</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>61</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mandiant on Sandworm APT Attacks in Ukraine</itunes:title>
    <title>Mandiant on Sandworm APT Attacks in Ukraine</title>
    <itunes:summary><![CDATA[Nathan Brubaker, Mandiant and Google Cloud Head of Emerging Threats and Analytics, joins the Claroty Nexus podcast for a timely discussion on his team’s report published this week on the Sandworm APT’s activity in Ukraine.   Sandworm leveraged a new TTP—Living off the Land techniques—to target a Ukrainian energy company in October 2022 to cause a power outage. That outage also coincided with missile attacks by Russia against critical infrastructure in Ukraine.   Read Mandiant's Sandworm ...]]></itunes:summary>
    <description><![CDATA[<p>Nathan Brubaker, Mandiant and Google Cloud Head of Emerging Threats and Analytics, joins the Claroty Nexus podcast for a timely discussion on his team’s report published this week on the Sandworm APT’s activity in Ukraine. <br/><br/>Sandworm leveraged a new TTP—Living off the Land techniques—to target a Ukrainian energy company in October 2022 to cause a power outage. That outage also coincided with missile attacks by Russia against critical infrastructure in Ukraine.<br/> <br/><a href='https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology'>Read Mandiant&apos;s Sandworm paper here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Nathan Brubaker, Mandiant and Google Cloud Head of Emerging Threats and Analytics, joins the Claroty Nexus podcast for a timely discussion on his team’s report published this week on the Sandworm APT’s activity in Ukraine. <br/><br/>Sandworm leveraged a new TTP—Living off the Land techniques—to target a Ukrainian energy company in October 2022 to cause a power outage. That outage also coincided with missile attacks by Russia against critical infrastructure in Ukraine.<br/> <br/><a href='https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology'>Read Mandiant&apos;s Sandworm paper here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13947493-mandiant-on-sandworm-apt-attacks-in-ukraine.mp3" length="21950317" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13947493</guid>
    <pubDate>Fri, 10 Nov 2023 13:00:00 -0500</pubDate>
    <podcast:soundbite startTime="672.6" duration="35.5" />
    <itunes:duration>1827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>60</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Don Weber on Security Culture in Control Environments, STAR Methodology</itunes:title>
    <title>Don Weber on Security Culture in Control Environments, STAR Methodology</title>
    <itunes:summary><![CDATA[Don Weber of Cutaway Security joins the Nexus podcast to discuss a trend in control environments where asset operators and engineers keep trained cybersecurity professionals at arm's length, citing safety concerns. As more control systems are connected and managed online, it's critical for certified security professionals to be included in overall safety and reliability activities. Otherwise new risk and vulnerabilities are likely to be introduced.  Weber also discusses a new methodology for ...]]></itunes:summary>
    <description><![CDATA[<p>Don Weber of Cutaway Security joins the Nexus podcast to discuss a trend in control environments where asset operators and engineers keep trained cybersecurity professionals at arm&apos;s length, citing safety concerns. As more control systems are connected and managed online, it&apos;s critical for certified security professionals to be included in overall safety and reliability activities. Otherwise new risk and vulnerabilities are likely to be introduced. <br/>Weber also discusses a new methodology for assessing implementation vulnerabilities within industrial automation and control systems. Read more about IACS STAR:<br/><a href='https://iacs-star-calculator.com/iacs_star_calculator.html'> IACS STAR Calculator</a><br/><a href='https://github.com/cutaway-security/IACS_STAR_Methodology'>IACS STAR GitHub</a></p>]]></description>
    <content:encoded><![CDATA[<p>Don Weber of Cutaway Security joins the Nexus podcast to discuss a trend in control environments where asset operators and engineers keep trained cybersecurity professionals at arm&apos;s length, citing safety concerns. As more control systems are connected and managed online, it&apos;s critical for certified security professionals to be included in overall safety and reliability activities. Otherwise new risk and vulnerabilities are likely to be introduced. <br/>Weber also discusses a new methodology for assessing implementation vulnerabilities within industrial automation and control systems. Read more about IACS STAR:<br/><a href='https://iacs-star-calculator.com/iacs_star_calculator.html'> IACS STAR Calculator</a><br/><a href='https://github.com/cutaway-security/IACS_STAR_Methodology'>IACS STAR GitHub</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13852208-don-weber-on-security-culture-in-control-environments-star-methodology.mp3" length="32196747" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13852208</guid>
    <pubDate>Thu, 26 Oct 2023 17:00:00 -0400</pubDate>
    <podcast:soundbite startTime="896.133" duration="40.0" />
    <itunes:duration>2681</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>59</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MITRE on Caldera for OT</itunes:title>
    <title>MITRE on Caldera for OT</title>
    <itunes:summary><![CDATA[Misha Belisle and Blaine Jeffries of MITRE join the Claroty Nexus podcast to discuss  Caldera for OT, a new set of operational technology plugins for the open source core Caldera adversary emulation platform. Caldera for OT supports the Modbus, BACnet, and dnp protocols, and Belisle and Jeffries hope to add future support for additional protocols. Red and purple teams may use Caldera for OT for adversary emulation in order to understand the exposure of these protocols to attacks.  Calder...]]></itunes:summary>
    <description><![CDATA[<p>Misha Belisle and Blaine Jeffries of MITRE join the Claroty Nexus podcast to discuss  Caldera for OT, a new set of operational technology plugins for the open source core Caldera adversary emulation platform. Caldera for OT supports the Modbus, BACnet, and dnp protocols, and Belisle and Jeffries hope to add future support for additional protocols. Red and purple teams may use Caldera for OT for adversary emulation in order to understand the exposure of these protocols to attacks. <br/><a href='https://github.com/mitre/caldera-ot'>Caldera for OT is available here.</a></p>]]></description>
    <content:encoded><![CDATA[<p>Misha Belisle and Blaine Jeffries of MITRE join the Claroty Nexus podcast to discuss  Caldera for OT, a new set of operational technology plugins for the open source core Caldera adversary emulation platform. Caldera for OT supports the Modbus, BACnet, and dnp protocols, and Belisle and Jeffries hope to add future support for additional protocols. Red and purple teams may use Caldera for OT for adversary emulation in order to understand the exposure of these protocols to attacks. <br/><a href='https://github.com/mitre/caldera-ot'>Caldera for OT is available here.</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13723463-mitre-on-caldera-for-ot.mp3" length="31491658" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13723463</guid>
    <pubDate>Thu, 05 Oct 2023 15:00:00 -0400</pubDate>
    <podcast:soundbite startTime="450.383" duration="22.0" />
    <itunes:duration>2622</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>58</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jim LaBonty on the OT Security Stack</itunes:title>
    <title>Jim LaBonty on the OT Security Stack</title>
    <itunes:summary><![CDATA[Retired Pfizer Chief Information Security Officer Jim Labonty joins the podcast to discuss the operational technology (OT) security stack, and how it differs from IT. This episode provides especially important for the growing number of security leaders who are newly responsible for OT cybersecurity and the safety of cyber-physical systems.   Labonty also shares his experience during his time at Pfizer in securing the development of Pfizer's Covid-19 vaccine, and how not only security of ...]]></itunes:summary>
    <description><![CDATA[<p>Retired Pfizer Chief Information Security Officer Jim Labonty joins the podcast to discuss the operational technology (OT) security stack, and how it differs from IT. This episode provides especially important for the growing number of security leaders who are newly responsible for OT cybersecurity and the safety of cyber-physical systems. <br/><br/>Labonty also shares his experience during his time at Pfizer in securing the development of Pfizer&apos;s Covid-19 vaccine, and how not only security of the manufacturing process took top priority, but also supply chain security. </p>]]></description>
    <content:encoded><![CDATA[<p>Retired Pfizer Chief Information Security Officer Jim Labonty joins the podcast to discuss the operational technology (OT) security stack, and how it differs from IT. This episode provides especially important for the growing number of security leaders who are newly responsible for OT cybersecurity and the safety of cyber-physical systems. <br/><br/>Labonty also shares his experience during his time at Pfizer in securing the development of Pfizer&apos;s Covid-19 vaccine, and how not only security of the manufacturing process took top priority, but also supply chain security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13532399-jim-labonty-on-the-ot-security-stack.mp3" length="33746470" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13532399</guid>
    <pubDate>Sun, 10 Sep 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="151.083" duration="31.5" />
    <itunes:duration>2810</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>57</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Stephen Reynolds on Protecting the CISO During Incident Investigations</itunes:title>
    <title>Stephen Reynolds on Protecting the CISO During Incident Investigations</title>
    <itunes:summary><![CDATA[Stephen Reynolds, a partner at the law firm of McDermott, Will, and Emery, joins the Nexus Podcast to discuss some of the concerns and questions CISOs and other security executives may have about their personal liability and exposure during breach investigations. The short of it: Don’t panic, but don’t be unprepared either. In this case, preparation equates to having personal legal counsel available, and document everything during an incident. Reynolds and Eli Lilly associate VP and assistant...]]></itunes:summary>
    <description><![CDATA[<p>Stephen Reynolds, a partner at the law firm of McDermott, Will, and Emery, joins the Nexus Podcast to discuss some of the concerns and questions CISOs and other security executives may have about their personal liability and exposure during breach investigations. The short of it: Don’t panic, but don’t be unprepared either. In this case, preparation equates to having personal legal counsel available, and document everything during an incident.<br/>Reynolds and Eli Lilly associate VP and assistant general counsel Nick Merker <a href='https://www.blackhat.com/us-23/briefings/schedule/#protecting-the-ciso-a-legal-journey-31541'>presented on this topic at Black Hat</a> under the context of the case and <a href='https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-sentenced-three-years-probation-covering-data#:~:text=SAN%20FRANCISCO%20%E2%80%93%20Joseph%20Sullivan%20was,United%20States%20Attorney%20Stephanie%20M.'>conviction of former Uber CISO Joe Sullivan</a>. Sullivan was convicted of obstruction of justice and misprision of a felony for his role in covering up a breach at Uber. <br/>Reynolds cautions that CISOs always remember that corporate counsel represent the company, and any attorney-client privilege is to the company and not the individual. He also reminds leaders to document the facts and information available at the time key decisions were made during an incident.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Stephen Reynolds, a partner at the law firm of McDermott, Will, and Emery, joins the Nexus Podcast to discuss some of the concerns and questions CISOs and other security executives may have about their personal liability and exposure during breach investigations. The short of it: Don’t panic, but don’t be unprepared either. In this case, preparation equates to having personal legal counsel available, and document everything during an incident.<br/>Reynolds and Eli Lilly associate VP and assistant general counsel Nick Merker <a href='https://www.blackhat.com/us-23/briefings/schedule/#protecting-the-ciso-a-legal-journey-31541'>presented on this topic at Black Hat</a> under the context of the case and <a href='https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-sentenced-three-years-probation-covering-data#:~:text=SAN%20FRANCISCO%20%E2%80%93%20Joseph%20Sullivan%20was,United%20States%20Attorney%20Stephanie%20M.'>conviction of former Uber CISO Joe Sullivan</a>. Sullivan was convicted of obstruction of justice and misprision of a felony for his role in covering up a breach at Uber. <br/>Reynolds cautions that CISOs always remember that corporate counsel represent the company, and any attorney-client privilege is to the company and not the individual. He also reminds leaders to document the facts and information available at the time key decisions were made during an incident.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13450291-stephen-reynolds-on-protecting-the-ciso-during-incident-investigations.mp3" length="24333052" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13450291</guid>
    <pubDate>Mon, 28 Aug 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="228.0" duration="37.5" />
    <itunes:duration>2026</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>56</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Team82 on NAS Research, OPC UA Exploit Framework</itunes:title>
    <title>Team82 on NAS Research, OPC UA Exploit Framework</title>
    <itunes:summary><![CDATA[Team82’s extensive research into network attached storage devices and the ubiquitous OPC UA industrial protocol came to a head recently in Las Vegas with a pair of presentations at Black Hat USA and DEF CON disclosing vulnerabilities in Synology and Western Digital NAS cloud connections and the unveiling of a unique OPC UA exploit framework.  In this episode of the Nexus podcast, researcher Noam Moshe explains how both research initiatives came to be, the implications of each for users, ...]]></itunes:summary>
    <description><![CDATA[<p>Team82’s extensive research into network attached storage devices and the ubiquitous OPC UA industrial protocol came to a head recently in Las Vegas with a pair of presentations at Black Hat USA and DEF CON disclosing vulnerabilities in Synology and Western Digital NAS cloud connections and the unveiling of a unique OPC UA exploit framework. </p><p>In this episode of the Nexus podcast, researcher Noam Moshe explains how both research initiatives came to be, the implications of each for users, and how the respective ecosystems have been made safer. <br/><br/><a href='https://claroty.com/team82/research/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-synology-ds920-edition'>Read our Synology research</a><br/><a href='https://claroty.com/team82/research/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-wd-pr4100-edition'>Read our Western Digital research</a><br/><a href='https://claroty.com/team82/research/opc-ua-deep-dive-series-a-one-of-a-kind-opc-ua-exploit-framework'>Read about our OPC UA exploit framework</a><br/><a href='https://github.com/claroty/opcua-exploit-framework'>Download the framework</a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Team82’s extensive research into network attached storage devices and the ubiquitous OPC UA industrial protocol came to a head recently in Las Vegas with a pair of presentations at Black Hat USA and DEF CON disclosing vulnerabilities in Synology and Western Digital NAS cloud connections and the unveiling of a unique OPC UA exploit framework. </p><p>In this episode of the Nexus podcast, researcher Noam Moshe explains how both research initiatives came to be, the implications of each for users, and how the respective ecosystems have been made safer. <br/><br/><a href='https://claroty.com/team82/research/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-synology-ds920-edition'>Read our Synology research</a><br/><a href='https://claroty.com/team82/research/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-wd-pr4100-edition'>Read our Western Digital research</a><br/><a href='https://claroty.com/team82/research/opc-ua-deep-dive-series-a-one-of-a-kind-opc-ua-exploit-framework'>Read about our OPC UA exploit framework</a><br/><a href='https://github.com/claroty/opcua-exploit-framework'>Download the framework</a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13409745-team82-on-nas-research-opc-ua-exploit-framework.mp3" length="24857756" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13409745</guid>
    <pubDate>Sun, 20 Aug 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="341.15" duration="39.5" />
    <itunes:duration>2070</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>55</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk</itunes:title>
    <title>Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk</title>
    <itunes:summary><![CDATA[In this episode of the Nexus podcast, Bishop Fox researchers Dan Petro and David Vargas explain their research into the Open Supervised Device Protocol (OSDP), meant to bring encryption to badge readers and controllers providing physical access controls at secure facilities.  Petro and Vargas explain a number of protocol weaknesses and vulnerabilities that defeat OSDP's promise of encryption and security. Through the attacks they describe, they're able carry out—among others—replay or downgra...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Nexus podcast, Bishop Fox researchers Dan Petro and David Vargas explain their research into the Open Supervised Device Protocol (OSDP), meant to bring encryption to badge readers and controllers providing physical access controls at secure facilities. <br/>Petro and Vargas explain a number of protocol weaknesses and vulnerabilities that defeat OSDP&apos;s promise of encryption and security. Through the attacks they describe, they&apos;re able carry out—among others—replay or downgrade attacks, which are enabled by severe key exchange vulnerabilities or weakened crypto keys as described in the protocol.<br/>Petro and Vargas unveiled this <a href='https://bishopfox.com/blog/breaking-into-secure-facilities-with-osdp'>research</a> during a presentation at Black Hat USA in Las Vegas. </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Nexus podcast, Bishop Fox researchers Dan Petro and David Vargas explain their research into the Open Supervised Device Protocol (OSDP), meant to bring encryption to badge readers and controllers providing physical access controls at secure facilities. <br/>Petro and Vargas explain a number of protocol weaknesses and vulnerabilities that defeat OSDP&apos;s promise of encryption and security. Through the attacks they describe, they&apos;re able carry out—among others—replay or downgrade attacks, which are enabled by severe key exchange vulnerabilities or weakened crypto keys as described in the protocol.<br/>Petro and Vargas unveiled this <a href='https://bishopfox.com/blog/breaking-into-secure-facilities-with-osdp'>research</a> during a presentation at Black Hat USA in Las Vegas. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13384157-bishop-fox-on-osdp-weaknesses-putting-secure-facilities-at-risk.mp3" length="19107817" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13384157</guid>
    <pubDate>Sun, 13 Aug 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="167.833" duration="22.0" />
    <itunes:duration>1590</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>54</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector</itunes:title>
    <title>Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector</title>
    <itunes:summary><![CDATA[Jennifer Lyn Walker, Director of Infrastructure Cyber Defense for the WaterISAC, joins the Nexus podcast to discuss the state of cybersecurity within the water and wastewater critical infrastructure sector. Walker explains where the cybersecurity technology, funding, and skills  gaps currently exist among smaller—and larger—water providers. She also covers recent improvements from water utilities, and what, in an ideal world, the cybersecurity industry and government could do to help.&nb...]]></itunes:summary>
    <description><![CDATA[<p>Jennifer Lyn Walker, Director of Infrastructure Cyber Defense for the WaterISAC, joins the Nexus podcast to discuss the state of cybersecurity within the water and wastewater critical infrastructure sector. Walker explains where the cybersecurity technology, funding, and skills  gaps currently exist among smaller—and larger—water providers. She also covers recent improvements from water utilities, and what, in an ideal world, the cybersecurity industry and government could do to help. </p>]]></description>
    <content:encoded><![CDATA[<p>Jennifer Lyn Walker, Director of Infrastructure Cyber Defense for the WaterISAC, joins the Nexus podcast to discuss the state of cybersecurity within the water and wastewater critical infrastructure sector. Walker explains where the cybersecurity technology, funding, and skills  gaps currently exist among smaller—and larger—water providers. She also covers recent improvements from water utilities, and what, in an ideal world, the cybersecurity industry and government could do to help. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13339993-jennifer-lyn-walker-on-cybersecurity-risks-in-the-water-sector.mp3" length="33652167" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13339993</guid>
    <pubDate>Thu, 03 Aug 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="950.383" duration="28.0" />
    <itunes:duration>2802</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>53</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kathleen Moriarty on CIS&#39; IoT Security Guidance</itunes:title>
    <title>Kathleen Moriarty on CIS&#39; IoT Security Guidance</title>
    <itunes:summary><![CDATA[Kathleen Moriarty, Chief Technology Officer of the Center for Internet Security (CIS) joins the Nexus podcast to discuss CIS' recently published IoT Embedded Security Guidance. The document walks vendors, developers, DevOps professionals through the most commonly used IoT  protocols and analyzes them from a security perspective. The aim is to help vendors and developers with this selection process and assist with building security in at the protocol level.  Download the guidance here. ]]></itunes:summary>
    <description><![CDATA[<p>Kathleen Moriarty, Chief Technology Officer of the Center for Internet Security (CIS) joins the Nexus podcast to discuss CIS&apos; recently published IoT Embedded Security Guidance. The document walks vendors, developers, DevOps professionals through the most commonly used IoT  protocols and analyzes them from a security perspective. The aim is to help vendors and developers with this selection process and assist with building security in at the protocol level. <br/><a href='https://www.cisecurity.org/insights/white-papers/internet-of-things-embedded-security-guidance'>Download the guidance here.</a></p>]]></description>
    <content:encoded><![CDATA[<p>Kathleen Moriarty, Chief Technology Officer of the Center for Internet Security (CIS) joins the Nexus podcast to discuss CIS&apos; recently published IoT Embedded Security Guidance. The document walks vendors, developers, DevOps professionals through the most commonly used IoT  protocols and analyzes them from a security perspective. The aim is to help vendors and developers with this selection process and assist with building security in at the protocol level. <br/><a href='https://www.cisecurity.org/insights/white-papers/internet-of-things-embedded-security-guidance'>Download the guidance here.</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13204609-kathleen-moriarty-on-cis-iot-security-guidance.mp3" length="27843236" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13204609</guid>
    <pubDate>Sun, 16 Jul 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="433.483" duration="37.5" />
    <itunes:duration>2318</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>52</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Walter Risi on the CISO&#39;s Journey from IT to OT</itunes:title>
    <title>Walter Risi on the CISO&#39;s Journey from IT to OT</title>
    <itunes:summary><![CDATA[Walter Risi, Global OT Lead and the Technology and Cyber Security Consulting leader at KPMG in Argentina, joins the Nexus podcast to discuss the CISO's journey from IT to OT.  Risi explains what's driving this convergence of security disciplines, and the challenges security leaders are facing across industries. You'll also learn why resilience should be the goal of enterprise security programs, the tools and experience necessary to successfully converge IT and OT security operations, and...]]></itunes:summary>
    <description><![CDATA[<p>Walter Risi, Global OT Lead and the Technology and Cyber Security Consulting leader at KPMG in Argentina, joins the Nexus podcast to discuss the CISO&apos;s journey from IT to OT. <br/>Risi explains what&apos;s driving this convergence of security disciplines, and the challenges security leaders are facing across industries. You&apos;ll also learn why resilience should be the goal of enterprise security programs, the tools and experience necessary to successfully converge IT and OT security operations, and the importance of bringing cybersecurity awareness and experience to OT engineers and operators. </p>]]></description>
    <content:encoded><![CDATA[<p>Walter Risi, Global OT Lead and the Technology and Cyber Security Consulting leader at KPMG in Argentina, joins the Nexus podcast to discuss the CISO&apos;s journey from IT to OT. <br/>Risi explains what&apos;s driving this convergence of security disciplines, and the challenges security leaders are facing across industries. You&apos;ll also learn why resilience should be the goal of enterprise security programs, the tools and experience necessary to successfully converge IT and OT security operations, and the importance of bringing cybersecurity awareness and experience to OT engineers and operators. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/13179023-walter-risi-on-the-ciso-s-journey-from-it-to-ot.mp3" length="25303507" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13179023</guid>
    <pubDate>Sun, 09 Jul 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="829.567" duration="32.0" />
    <itunes:duration>2107</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>51</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research</itunes:title>
    <title>Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research</title>
    <itunes:summary><![CDATA[Claroty Team82's Noam Moshe joins the Nexus podcast to discuss a recent research collaboration with OTORIO looking at Teltonika's 4G industrial routers and cloud management platforms. Eight vulnerabilities were uncovered and patched by the vendor in a recent update. Moshe discusses the vulnerabilities, attack vectors involved, and the state of secure development for IIoT routers.  Read Team82's report: "Triple Threat: Breaking Teltonika Routers Three Ways" ]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82&apos;s Noam Moshe joins the Nexus podcast to discuss a recent research collaboration with OTORIO looking at Teltonika&apos;s 4G industrial routers and cloud management platforms. Eight vulnerabilities were uncovered and patched by the vendor in a recent update. Moshe discusses the vulnerabilities, attack vectors involved, and the state of secure development for IIoT routers. <br/>Read Team82&apos;s report: <a href='https://claroty.com/team82/research/triple-threat-breaking-teltonika-routers-three-ways'>&quot;Triple Threat: Breaking Teltonika Routers Three Ways&quot;</a></p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82&apos;s Noam Moshe joins the Nexus podcast to discuss a recent research collaboration with OTORIO looking at Teltonika&apos;s 4G industrial routers and cloud management platforms. Eight vulnerabilities were uncovered and patched by the vendor in a recent update. Moshe discusses the vulnerabilities, attack vectors involved, and the state of secure development for IIoT routers. <br/>Read Team82&apos;s report: <a href='https://claroty.com/team82/research/triple-threat-breaking-teltonika-routers-three-ways'>&quot;Triple Threat: Breaking Teltonika Routers Three Ways&quot;</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12905285-noam-moshe-on-teltonika-4g-iiot-router-cybersecurity-research.mp3" length="12152554" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12905285</guid>
    <pubDate>Tue, 30 May 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="67.4" duration="27.0" />
    <itunes:duration>1011</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>50</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Charles Carmakal on Cybersecurity Threats to Healthcare</itunes:title>
    <title>Charles Carmakal on Cybersecurity Threats to Healthcare</title>
    <itunes:summary><![CDATA[Mandiant Chief Technology Officer Charles Carmakal joins the Claroty Nexus podcast to discuss real-world threats to healthcare organizations. Mandiant has a unique vantage point as an incident response team involved in many high-profile cyberattacks. Based on that insight, Carmakal is able to comment on the conventional and opportunistic attacks healthcare delivery organizations and providers are dealing with. Some of those include multifaceted extortion as well as intellectual property theft...]]></itunes:summary>
    <description><![CDATA[<p>Mandiant Chief Technology Officer Charles Carmakal joins the Claroty Nexus podcast to discuss real-world threats to healthcare organizations. Mandiant has a unique vantage point as an incident response team involved in many high-profile cyberattacks. Based on that insight, Carmakal is able to comment on the conventional and opportunistic attacks healthcare delivery organizations and providers are dealing with. Some of those include multifaceted extortion as well as intellectual property theft. He also discusses whether attacks targeting medical devices are a reality. </p>]]></description>
    <content:encoded><![CDATA[<p>Mandiant Chief Technology Officer Charles Carmakal joins the Claroty Nexus podcast to discuss real-world threats to healthcare organizations. Mandiant has a unique vantage point as an incident response team involved in many high-profile cyberattacks. Based on that insight, Carmakal is able to comment on the conventional and opportunistic attacks healthcare delivery organizations and providers are dealing with. Some of those include multifaceted extortion as well as intellectual property theft. He also discusses whether attacks targeting medical devices are a reality. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12905063-charles-carmakal-on-cybersecurity-threats-to-healthcare.mp3" length="27312862" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12905063</guid>
    <pubDate>Wed, 24 May 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="592.317" duration="23.5" />
    <itunes:duration>2274</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Lorrie Cranor on IoT Security and Privacy Labels</itunes:title>
    <title>Lorrie Cranor on IoT Security and Privacy Labels</title>
    <itunes:summary><![CDATA[Lorrie Cranor, Director and Bosch Distinguished Professor in Security and Privacy Technologies at Carnegie Mellon University's CyLab, joins the Nexus podcast to discuss an IoT security and privacy label initiative under way at CyLab. The labels are meant not only to help consumers make informed buying decisions, but also to nudge vendors and manufacturers closer toward delivering secure smart devices to market.      ]]></itunes:summary>
    <description><![CDATA[<p>Lorrie Cranor, Director and Bosch Distinguished Professor in Security and Privacy Technologies at Carnegie Mellon University&apos;s CyLab, joins the Nexus podcast to discuss an <a href='https://iotsecurityprivacy.org/'>IoT security and privacy label</a> initiative under way at CyLab. The labels are meant not only to help consumers make informed buying decisions, but also to nudge vendors and manufacturers closer toward delivering secure smart devices to market. <br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Lorrie Cranor, Director and Bosch Distinguished Professor in Security and Privacy Technologies at Carnegie Mellon University&apos;s CyLab, joins the Nexus podcast to discuss an <a href='https://iotsecurityprivacy.org/'>IoT security and privacy label</a> initiative under way at CyLab. The labels are meant not only to help consumers make informed buying decisions, but also to nudge vendors and manufacturers closer toward delivering secure smart devices to market. <br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12728137-lorrie-cranor-on-iot-security-and-privacy-labels.mp3" length="23531153" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12728137</guid>
    <pubDate>Thu, 27 Apr 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="647.917" duration="46.0" />
    <itunes:duration>1959</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity</itunes:title>
    <title>Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity</title>
    <itunes:summary><![CDATA[Skip Sorrels, director of cybersecurity at Ascension Technologies, which oversees the technology needs for Ascension Healthcare, one of the country’s biggest non-profit healthcare providers, joins the Nexus podcast to discuss the 405(d) Task Group's  Health Industry Cybersecurity Practices (HICP).  The HICP identifies top cybersecurity threats to the healthcare industry, and 10 blocking-and-tackling mitigation practices and sub-practices aimed at not only larger, more resourced organizat...]]></itunes:summary>
    <description><![CDATA[<p>Skip Sorrels, director of cybersecurity at Ascension Technologies, which oversees the technology needs for Ascension Healthcare, one of the country’s biggest non-profit healthcare providers, joins the Nexus podcast to discuss the 405(d) Task Group&apos;s <b> </b><a href='https://405d.hhs.gov/protect/hicp'><b>Health Industry Cybersecurity Practices (HICP)</b></a><b>.<br/><br/></b>The HICP identifies top cybersecurity threats to the healthcare industry, and 10 blocking-and-tackling mitigation practices and sub-practices aimed at not only larger, more resourced organizations, but also smaller healthcare providers.</p>]]></description>
    <content:encoded><![CDATA[<p>Skip Sorrels, director of cybersecurity at Ascension Technologies, which oversees the technology needs for Ascension Healthcare, one of the country’s biggest non-profit healthcare providers, joins the Nexus podcast to discuss the 405(d) Task Group&apos;s <b> </b><a href='https://405d.hhs.gov/protect/hicp'><b>Health Industry Cybersecurity Practices (HICP)</b></a><b>.<br/><br/></b>The HICP identifies top cybersecurity threats to the healthcare industry, and 10 blocking-and-tackling mitigation practices and sub-practices aimed at not only larger, more resourced organizations, but also smaller healthcare providers.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12529241-skip-sorrels-on-the-405-d-hicp-healthcare-cybersecurity.mp3" length="29590848" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12529241</guid>
    <pubDate>Tue, 18 Apr 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="790.117" duration="29.5" />
    <itunes:duration>2464</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dave Elfering on Cyber Liability Insurance </itunes:title>
    <title>Dave Elfering on Cyber Liability Insurance </title>
    <itunes:summary><![CDATA[Dave Elfering, senior vice president at Marsh, a global insurance broker and risk management company, joins the Nexus podcast to discuss the current state of cyber insurance. A longtime figure in information security, Elfering explains the current volatility around coverage, premiums, and exclusions. He goes deep into what can sometimes be contentious discussions about qualifications and controls that must be implemented in order to be eligible for coverage, in addition to policy exclusions.&...]]></itunes:summary>
    <description><![CDATA[<p>Dave Elfering, senior vice president at Marsh, a global insurance broker and risk management company, joins the Nexus podcast to discuss the current state of cyber insurance. A longtime figure in information security, Elfering explains the current volatility around coverage, premiums, and exclusions. He goes deep into what can sometimes be contentious discussions about qualifications and controls that must be implemented in order to be eligible for coverage, in addition to policy exclusions. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Dave Elfering, senior vice president at Marsh, a global insurance broker and risk management company, joins the Nexus podcast to discuss the current state of cyber insurance. A longtime figure in information security, Elfering explains the current volatility around coverage, premiums, and exclusions. He goes deep into what can sometimes be contentious discussions about qualifications and controls that must be implemented in order to be eligible for coverage, in addition to policy exclusions. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12612061-dave-elfering-on-cyber-liability-insurance.mp3" length="30674170" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12612061</guid>
    <pubDate>Mon, 10 Apr 2023 01:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1118.467" duration="34.0" />
    <itunes:duration>2554</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vera Mens on Akuvox E11 Vulnerabilities</itunes:title>
    <title>Vera Mens on Akuvox E11 Vulnerabilities</title>
    <itunes:summary><![CDATA[Team82 researcher Vera Mens joins the Nexus podcast to discuss her research that uncovered 13 vulnerabilities in the popular Akuvox E11 smart intercoms. These devices are used to control access to offices, residential, and commercial establishments. The vulnerabilities range in severity, and pose serious privacy implications for users. Vera will discuss her research and a challenging disclosure withe vendor that began 15 months ago.   Read Team82's technical report on this research here....]]></itunes:summary>
    <description><![CDATA[<p>Team82 researcher Vera Mens joins the Nexus podcast to discuss her research that uncovered 13 vulnerabilities in the popular Akuvox E11 smart intercoms. These devices are used to control access to offices, residential, and commercial establishments. The vulnerabilities range in severity, and pose serious privacy implications for users. Vera will discuss her research and a challenging disclosure withe vendor that began 15 months ago.  <br/><a href='https://claroty.com/team82/research/the-silent-spy-among-us-modern-attacks-against-smart-intercoms'>Read Team82&apos;s technical report on this research here</a>. <br/><a href='https://claroty.com/team82/blog/akuvox-smart-intercom-vulnerabilities-leave-privacy-ajar'>Read Team82&apos;s blog here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Team82 researcher Vera Mens joins the Nexus podcast to discuss her research that uncovered 13 vulnerabilities in the popular Akuvox E11 smart intercoms. These devices are used to control access to offices, residential, and commercial establishments. The vulnerabilities range in severity, and pose serious privacy implications for users. Vera will discuss her research and a challenging disclosure withe vendor that began 15 months ago.  <br/><a href='https://claroty.com/team82/research/the-silent-spy-among-us-modern-attacks-against-smart-intercoms'>Read Team82&apos;s technical report on this research here</a>. <br/><a href='https://claroty.com/team82/blog/akuvox-smart-intercom-vulnerabilities-leave-privacy-ajar'>Read Team82&apos;s blog here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12485775-vera-mens-on-akuvox-e11-vulnerabilities.mp3" length="15331403" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12485775</guid>
    <pubDate>Wed, 22 Mar 2023 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="696.05" duration="32.0" />
    <itunes:duration>1276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Adm. Mike Rogers on the National Cybersecurity Strategy</itunes:title>
    <title>Adm. Mike Rogers on the National Cybersecurity Strategy</title>
    <itunes:summary><![CDATA[Adm. Mike Rogers, USN (Ret.) joins the Nexus podcast to discuss the recently released National Cybersecurity Strategy, the first such strategy from the Biden administration. The strategy codifies many of the cyber-physical systems security initiatives the White House has produced since 2021 in the aftermath of the Colonial Pipeline ransomware attack. Adm. Rogers shares his past contributions to previous strategies, and provides insight into the document's five pillars and how they will impact...]]></itunes:summary>
    <description><![CDATA[<p>Adm. Mike Rogers, USN (Ret.) joins the Nexus podcast to discuss the recently released <a href='https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf'>National Cybersecurity Strategy</a>, the first such strategy from the Biden administration. The strategy codifies many of the cyber-physical systems security initiatives the White House has produced since 2021 in the aftermath of the Colonial Pipeline ransomware attack. Adm. Rogers shares his past contributions to previous strategies, and provides insight into the document&apos;s five pillars and how they will impact critical infrastructure security in the near term. </p>]]></description>
    <content:encoded><![CDATA[<p>Adm. Mike Rogers, USN (Ret.) joins the Nexus podcast to discuss the recently released <a href='https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf'>National Cybersecurity Strategy</a>, the first such strategy from the Biden administration. The strategy codifies many of the cyber-physical systems security initiatives the White House has produced since 2021 in the aftermath of the Colonial Pipeline ransomware attack. Adm. Rogers shares his past contributions to previous strategies, and provides insight into the document&apos;s five pillars and how they will impact critical infrastructure security in the near term. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12401025-adm-mike-rogers-on-the-national-cybersecurity-strategy.mp3" length="28555768" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12401025</guid>
    <pubDate>Thu, 09 Mar 2023 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1497.55" duration="34.5" />
    <itunes:duration>2378</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity </itunes:title>
    <title>Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity </title>
    <itunes:summary><![CDATA[Katherine Gronberg, head of government services at cybersecurity venture capital firm NightDragon, joins the Nexus Podcast to discuss what's driving the federal government's renewed interest and investment in OT and IoT cybersecurity. Katherine brings insight from her unique perspective on these issues, especially as it pertains to upcoming requirements facing asset owners and operators, how vendors must respond to mandates put out by the White House, and what might be in the impending nation...]]></itunes:summary>
    <description><![CDATA[<p>Katherine Gronberg, head of government services at cybersecurity venture capital firm NightDragon, joins the Nexus Podcast to discuss what&apos;s driving the federal government&apos;s renewed interest and investment in OT and IoT cybersecurity. Katherine brings insight from her unique perspective on these issues, especially as it pertains to upcoming requirements facing asset owners and operators, how vendors must respond to mandates put out by the White House, and what might be in the impending national cybersecurity strategy from the  White House Office of the National Cyber Director. <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Katherine Gronberg, head of government services at cybersecurity venture capital firm NightDragon, joins the Nexus Podcast to discuss what&apos;s driving the federal government&apos;s renewed interest and investment in OT and IoT cybersecurity. Katherine brings insight from her unique perspective on these issues, especially as it pertains to upcoming requirements facing asset owners and operators, how vendors must respond to mandates put out by the White House, and what might be in the impending national cybersecurity strategy from the  White House Office of the National Cyber Director. <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/12213277-katherine-gronberg-on-the-federal-government-and-ot-iot-cybersecurity.mp3" length="31660712" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12213277</guid>
    <pubDate>Thu, 09 Feb 2023 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1203.083" duration="20.0" />
    <itunes:duration>2636</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on a Generic WAF Bypass Technique</itunes:title>
    <title>Noam Moshe on a Generic WAF Bypass Technique</title>
    <itunes:summary><![CDATA[Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors' web application firewalls. This research was presented at Black Hat Europe and on the Team82 blog.  The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious.  All of the leading vendors have since added JSON support to their S...]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors&apos; web application firewalls.<br/>This research was presented at Black Hat Europe and on the <a href='https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf'>Team82 blog</a>.  The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious. <br/>All of the leading vendors have since added JSON support to their SQL injection processes. </p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors&apos; web application firewalls.<br/>This research was presented at Black Hat Europe and on the <a href='https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf'>Team82 blog</a>.  The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious. <br/>All of the leading vendors have since added JSON support to their SQL injection processes. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11897620-noam-moshe-on-a-generic-waf-bypass-technique.mp3" length="22170930" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11897620</guid>
    <pubDate>Mon, 19 Dec 2022 13:00:00 -0500</pubDate>
    <podcast:soundbite startTime="633.067" duration="36.5" />
    <itunes:duration>1846</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sharon Brizinov on Hacking IoT</itunes:title>
    <title>Sharon Brizinov on Hacking IoT</title>
    <itunes:summary><![CDATA[Claroty Team82 Director of Research Sharon Brizinov joins the podcast to discuss the recent Pwn2Own Toronto event. Brizinov was successful in three categories at the event, finding and exploiting zero day vulnerabilities in two network-attached storage devices and a popular router.   In this episode, Brizinov explains his preparation for the contest, and compares and contrasts hacking industrial control systems and internet of things connected devices.  ]]></itunes:summary>
    <description><![CDATA[<p>Claroty <a href='https://claroty.com/team82'>Team82</a> Director of Research Sharon Brizinov joins the podcast to discuss the recent <a href='https://www.zerodayinitiative.com/blog/2022/12/8/pwn2own-toronto-2022-day-three-results'>Pwn2Own Toronto</a> event. Brizinov was successful in three categories at the event, finding and exploiting zero day vulnerabilities in two network-attached storage devices and a popular router. <br/><br/>In this episode, Brizinov explains his preparation for the contest, and compares and contrasts hacking industrial control systems and internet of things connected devices. </p>]]></description>
    <content:encoded><![CDATA[<p>Claroty <a href='https://claroty.com/team82'>Team82</a> Director of Research Sharon Brizinov joins the podcast to discuss the recent <a href='https://www.zerodayinitiative.com/blog/2022/12/8/pwn2own-toronto-2022-day-three-results'>Pwn2Own Toronto</a> event. Brizinov was successful in three categories at the event, finding and exploiting zero day vulnerabilities in two network-attached storage devices and a popular router. <br/><br/>In this episode, Brizinov explains his preparation for the contest, and compares and contrasts hacking industrial control systems and internet of things connected devices. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11856442-sharon-brizinov-on-hacking-iot.mp3" length="18965051" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11856442</guid>
    <pubDate>Mon, 12 Dec 2022 11:00:00 -0500</pubDate>
    <podcast:soundbite startTime="913.917" duration="37.0" />
    <itunes:duration>1579</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Joe Slowik on TRITON Malware, XENOTIME Hacking Group</itunes:title>
    <title>Joe Slowik on TRITON Malware, XENOTIME Hacking Group</title>
    <itunes:summary><![CDATA[Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack.  Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences a...]]></itunes:summary>
    <description><![CDATA[<p>Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack. <br/>Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences and loss of life. <br/>Slowik&apos;s recent <a href='https://www.virusbulletin.com/conference/vb2022/abstracts/zeroing-xenotime-analysis-entities-responsible-triton-event/'>Virus Bulletin paper</a> and <a href='https://www.youtube.com/watch?v=KmYQvG0Lvfk'>presentation</a> describes the complex ecosystem behind XENOTIME, its connections to Russian intelligence, and the tooling it built enabling the Triton attack and deployment.<br/>One question does linger: Who wrote Triton?  </p>]]></description>
    <content:encoded><![CDATA[<p>Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack. <br/>Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences and loss of life. <br/>Slowik&apos;s recent <a href='https://www.virusbulletin.com/conference/vb2022/abstracts/zeroing-xenotime-analysis-entities-responsible-triton-event/'>Virus Bulletin paper</a> and <a href='https://www.youtube.com/watch?v=KmYQvG0Lvfk'>presentation</a> describes the complex ecosystem behind XENOTIME, its connections to Russian intelligence, and the tooling it built enabling the Triton attack and deployment.<br/>One question does linger: Who wrote Triton?  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11587235-joe-slowik-on-triton-malware-xenotime-hacking-group.mp3" length="30463779" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11587235</guid>
    <pubDate>Fri, 28 Oct 2022 18:00:00 -0400</pubDate>
    <podcast:soundbite startTime="371.583" duration="42.5" />
    <itunes:duration>2537</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside Team82&#39;s EvilPLC Attack</itunes:title>
    <title>Inside Team82&#39;s EvilPLC Attack</title>
    <itunes:summary><![CDATA[Team82's Noam Moshe, one of the researchers involved in developing the EvilPLC attack, discusses the technique of using a weaponized programmable logic controller to compromise an engineer's workstation and gain access to other PLCs on the OT network.   Read more about the EvilPLC technique Download Team82's paper on EvilPLC   ]]></itunes:summary>
    <description><![CDATA[<p>Team82&apos;s Noam Moshe, one of the researchers involved in developing the EvilPLC attack, discusses the technique of using a weaponized programmable logic controller to compromise an engineer&apos;s workstation and gain access to other PLCs on the OT network. <br/><br/><a href='https://claroty.com/team82/research/evil-plc-attack-using-a-controller-as-predator-rather-than-prey'>Read more about the EvilPLC technique</a><br/><a href='https://claroty.com/team82/research/white-papers/evil-plc-attack-weaponizing-plcs'>Download Team82&apos;s paper on EvilPLC</a><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Team82&apos;s Noam Moshe, one of the researchers involved in developing the EvilPLC attack, discusses the technique of using a weaponized programmable logic controller to compromise an engineer&apos;s workstation and gain access to other PLCs on the OT network. <br/><br/><a href='https://claroty.com/team82/research/evil-plc-attack-using-a-controller-as-predator-rather-than-prey'>Read more about the EvilPLC technique</a><br/><a href='https://claroty.com/team82/research/white-papers/evil-plc-attack-weaponizing-plcs'>Download Team82&apos;s paper on EvilPLC</a><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11531014-inside-team82-s-evilplc-attack.mp3" length="16347492" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11531014</guid>
    <pubDate>Thu, 20 Oct 2022 00:00:00 -0400</pubDate>
    <itunes:duration>1329</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List</itunes:title>
    <title>Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List</title>
    <itunes:summary><![CDATA[Sarah Fluchs, CTO at Admeritia, joins the Aperture podcast to discuss the Top 20 Secure PLC Coding Practices List. Written for engineers by engineers, the list provides recommendations that can be used to securely design and code programmable logic controllers (PLCs).  The first iteration of the list was published in 2021, and since then, its core group of maintainers has grown to 75 and more than 1,000 engineers and experts registered as contributors.  The list has been prominent referenced ...]]></itunes:summary>
    <description><![CDATA[<p>Sarah Fluchs, CTO at Admeritia, joins the Aperture podcast to discuss the <a href='https://plc-security.com/content/Top_20_Secure_PLC_Coding_Practices_V1.0.pdf'>Top 20 Secure PLC Coding Practices List</a>. Written for engineers by engineers, the list provides recommendations that can be used to securely design and code programmable logic controllers (PLCs). <br/>The <a href='https://claroty.com/resources/podcasts/top-20-secure-plc-coding-practices-list'>first iteration of the list </a>was published in 2021, and since then, its core group of maintainers has grown to 75 and more than 1,000 engineers and experts registered as contributors. <br/>The list has been prominent referenced in training materials and other resources, including the NATO guide for protecting automation and control systems, and MITRE is considering integrating the list into its CWE database. <br/>In this episode, Sarah discusses <a href='https://fluchsfriction.medium.com/one-year-of-top-20-secure-plc-coding-practices-c2f0042ad4a2'>secure PLC programming</a>, how the list was developed, and how it should be used by engineers and security practitioners. </p>]]></description>
    <content:encoded><![CDATA[<p>Sarah Fluchs, CTO at Admeritia, joins the Aperture podcast to discuss the <a href='https://plc-security.com/content/Top_20_Secure_PLC_Coding_Practices_V1.0.pdf'>Top 20 Secure PLC Coding Practices List</a>. Written for engineers by engineers, the list provides recommendations that can be used to securely design and code programmable logic controllers (PLCs). <br/>The <a href='https://claroty.com/resources/podcasts/top-20-secure-plc-coding-practices-list'>first iteration of the list </a>was published in 2021, and since then, its core group of maintainers has grown to 75 and more than 1,000 engineers and experts registered as contributors. <br/>The list has been prominent referenced in training materials and other resources, including the NATO guide for protecting automation and control systems, and MITRE is considering integrating the list into its CWE database. <br/>In this episode, Sarah discusses <a href='https://fluchsfriction.medium.com/one-year-of-top-20-secure-plc-coding-practices-c2f0042ad4a2'>secure PLC programming</a>, how the list was developed, and how it should be used by engineers and security practitioners. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11413428-sarah-fluchs-revisits-the-top-20-secure-plc-coding-practices-list.mp3" length="33911341" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11413428</guid>
    <pubDate>Fri, 30 Sep 2022 11:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1007.067" duration="19.5" />
    <itunes:duration>2824</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vergle Gipson on Cyber-Informed Engineering</itunes:title>
    <title>Vergle Gipson on Cyber-Informed Engineering</title>
    <itunes:summary><![CDATA[Vergle Gipson, senior advisor, at Idaho National Lab's Cybercore Integration Center, joins the podcast to discuss cyber-informed engineering and the maturing discipline of operational technology (OT) cybersecurity.  Gipson recently testified before a House Committee on Homeland Security about the need to secure industrial control systems against cyberattacks. One of the recommendations he suggested to the committee was the need for cyber-informed engineering, which has parallels to secur...]]></itunes:summary>
    <description><![CDATA[<p>Vergle Gipson, senior advisor, at Idaho National Lab&apos;s Cybercore Integration Center, joins the podcast to discuss cyber-informed engineering and the maturing discipline of operational technology (OT) cybersecurity. <br/>Gipson recently testified before a House Committee on Homeland Security about the need to secure industrial control systems against cyberattacks. One of the recommendations he suggested to the committee was the need for cyber-informed engineering, which has parallels to secure software development for IT.  Gipson discusses CIE and the need for cyber-physical system security and critical function assurance. </p>]]></description>
    <content:encoded><![CDATA[<p>Vergle Gipson, senior advisor, at Idaho National Lab&apos;s Cybercore Integration Center, joins the podcast to discuss cyber-informed engineering and the maturing discipline of operational technology (OT) cybersecurity. <br/>Gipson recently testified before a House Committee on Homeland Security about the need to secure industrial control systems against cyberattacks. One of the recommendations he suggested to the committee was the need for cyber-informed engineering, which has parallels to secure software development for IT.  Gipson discusses CIE and the need for cyber-physical system security and critical function assurance. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11395633-vergle-gipson-on-cyber-informed-engineering.mp3" length="32143016" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11395633</guid>
    <pubDate>Wed, 28 Sep 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="810.1" duration="45.0" />
    <itunes:duration>2677</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Noam Moshe on the Evil PLC Attack</itunes:title>
    <title>Noam Moshe on the Evil PLC Attack</title>
    <itunes:summary><![CDATA[Claroty Team82 researcher Noam Moshe joins the podcast to discuss the Evil PLC Attack research published recently. Evil PLC is a technique whereby a weaponized PLC is used to compromise an engineering workstation in order to move deeper onto the OT network, the enterprise network, or other PLCs.   Read Team82's blog here.  Download our technical paper here (free PDF). ]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the podcast to discuss the Evil PLC Attack research published recently. Evil PLC is a technique whereby a weaponized PLC is used to compromise an engineering workstation in order to move deeper onto the OT network, the enterprise network, or other PLCs.<br/> <br/><a href='https://claroty.com/team82/research/evil-plc-attack-using-a-controller-as-predator-rather-than-prey'>Read Team82&apos;s blog here</a>. <br/><a href='https://claroty.com/resources/reports/evil-plc-attack-weaponizing-plcs'>Download our technical paper here (free PDF)</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82 researcher Noam Moshe joins the podcast to discuss the Evil PLC Attack research published recently. Evil PLC is a technique whereby a weaponized PLC is used to compromise an engineering workstation in order to move deeper onto the OT network, the enterprise network, or other PLCs.<br/> <br/><a href='https://claroty.com/team82/research/evil-plc-attack-using-a-controller-as-predator-rather-than-prey'>Read Team82&apos;s blog here</a>. <br/><a href='https://claroty.com/resources/reports/evil-plc-attack-weaponizing-plcs'>Download our technical paper here (free PDF)</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/11159913-noam-moshe-on-the-evil-plc-attack.mp3" length="24175858" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11159913</guid>
    <pubDate>Fri, 19 Aug 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="113.867" duration="39.0" />
    <itunes:duration>2013</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dan Gunter on Threat Hunting in Industrial Control Systems</itunes:title>
    <title>Dan Gunter on Threat Hunting in Industrial Control Systems</title>
    <itunes:summary><![CDATA[Insane Forensics CEO and founder Dan Gunter joins the Aperture podcast to discuss threat hunting approaches inside industrial control systems (ICS) and operational technology (OT) networks. Gunter describes how Shodan can be used to understand exposures within an industrial network and threats posed by trust relationships to the OT network. Gunter explains what asset operators and owners need in place to begin threat hunting, what they should be looking for, and how to use tools such as Shoda...]]></itunes:summary>
    <description><![CDATA[<p>Insane Forensics CEO and founder Dan Gunter joins the Aperture podcast to discuss threat hunting approaches inside industrial control systems (ICS) and operational technology (OT) networks. Gunter describes how Shodan can be used to understand exposures within an industrial network and threats posed by trust relationships to the OT network. Gunter explains what asset operators and owners need in place to begin threat hunting, what they should be looking for, and how to use tools such as Shodan to their greatest effect. </p>]]></description>
    <content:encoded><![CDATA[<p>Insane Forensics CEO and founder Dan Gunter joins the Aperture podcast to discuss threat hunting approaches inside industrial control systems (ICS) and operational technology (OT) networks. Gunter describes how Shodan can be used to understand exposures within an industrial network and threats posed by trust relationships to the OT network. Gunter explains what asset operators and owners need in place to begin threat hunting, what they should be looking for, and how to use tools such as Shodan to their greatest effect. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10923192-dan-gunter-on-threat-hunting-in-industrial-control-systems.mp3" length="27862622" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10923192</guid>
    <pubDate>Mon, 18 Jul 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="518.383" duration="30.0" />
    <itunes:duration>2320</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dan Ricci on the ICS Advisory Project</itunes:title>
    <title>Dan Ricci on the ICS Advisory Project</title>
    <itunes:summary><![CDATA[Dan Ricci joins the podcast to discuss the ICS Advisory Project. Ricci founded the project in 2018, which provides vulnerability management teams with a searchable, intuitive dashboard that visualizes industrial control system security and vulnerability advisories and threat data.  In this episode, Ricci explains how the ICS Advisory Project got off the ground, some of the features it currently offers, how it can be used by security analysts and OT operators, and where he imagines the pr...]]></itunes:summary>
    <description><![CDATA[<p>Dan Ricci joins the podcast to discuss the ICS Advisory Project. Ricci founded the project in 2018, which provides vulnerability management teams with a <a href='https://datastudio.google.com/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC '>searchable, intuitive dashboard</a> that visualizes industrial control system security and vulnerability advisories and threat data. <br/>In this episode, Ricci explains how the ICS Advisory Project got off the ground, some of the features it currently offers, how it can be used by security analysts and OT operators, and where he imagines the project will be in a year as new features are added and refined. <br/><br/><br/><br/><br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Dan Ricci joins the podcast to discuss the ICS Advisory Project. Ricci founded the project in 2018, which provides vulnerability management teams with a <a href='https://datastudio.google.com/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC '>searchable, intuitive dashboard</a> that visualizes industrial control system security and vulnerability advisories and threat data. <br/>In this episode, Ricci explains how the ICS Advisory Project got off the ground, some of the features it currently offers, how it can be used by security analysts and OT operators, and where he imagines the project will be in a year as new features are added and refined. <br/><br/><br/><br/><br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10884874-dan-ricci-on-the-ics-advisory-project.mp3" length="23807853" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10884874</guid>
    <pubDate>Wed, 06 Jul 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="501.417" duration="31.0" />
    <itunes:duration>1982</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Vera Mens on Hacking Flow Computers</itunes:title>
    <title>Vera Mens on Hacking Flow Computers</title>
    <itunes:summary><![CDATA[Claroty Team82 researcher Vera Mens joins the podcast to discuss her BSides Tel Aviv presentation today called, "Total Flaw: Hacking Flow Computers for Fun and Free Gas."  Flow computers calculate flow rates for gas, oil, and more, and could be a key target for an experienced attacker who is looking to disrupt or damage a process in the oil and gas industry.  Mens uncovered two vulnerabilities that gave her access to a vendor's flow computer and allowed her to write code to the devi...]]></itunes:summary>
    <description><![CDATA[<p>Claroty Team82 researcher Vera Mens joins the podcast to discuss her BSides Tel Aviv presentation today called, &quot;<a href='https://bsidestlv.com/agenda/total_flaw__hacking_flow_computers_for_fun_and_free_gas/'>Total Flaw: Hacking Flow Computers for Fun and Free Gas.</a>&quot; <br/>Flow computers calculate flow rates for gas, oil, and more, and could be a key target for an experienced attacker who is looking to disrupt or damage a process in the oil and gas industry. <br/>Mens uncovered two vulnerabilities that gave her access to a vendor&apos;s flow computer and allowed her to write code to the device; the vulnerabilities have been patched, and she shared some details in her talk today. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Claroty Team82 researcher Vera Mens joins the podcast to discuss her BSides Tel Aviv presentation today called, &quot;<a href='https://bsidestlv.com/agenda/total_flaw__hacking_flow_computers_for_fun_and_free_gas/'>Total Flaw: Hacking Flow Computers for Fun and Free Gas.</a>&quot; <br/>Flow computers calculate flow rates for gas, oil, and more, and could be a key target for an experienced attacker who is looking to disrupt or damage a process in the oil and gas industry. <br/>Mens uncovered two vulnerabilities that gave her access to a vendor&apos;s flow computer and allowed her to write code to the device; the vulnerabilities have been patched, and she shared some details in her talk today. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10869332-vera-mens-on-hacking-flow-computers.mp3" length="27576065" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10869332</guid>
    <pubDate>Thu, 30 Jun 2022 05:00:00 -0400</pubDate>
    <podcast:soundbite startTime="564.817" duration="38.5" />
    <itunes:duration>2296</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Don C. Weber on ICS Cybersecurity Training, Education</itunes:title>
    <title>Don C. Weber on ICS Cybersecurity Training, Education</title>
    <itunes:summary><![CDATA[Don C. Weber, founder of Cutaway Security, joins the podcast to discuss his extensive career in information security, his journey to industrial control system cybersecurity, and his desire to educate, train and mentor others in the community. Weber’s business focuses on security services for industrial environments through program reviews, security assessments, penetration testing, and training. He is also a SANS instructor and a fixture at Black Hat/DEF CON and other major events. He also ru...]]></itunes:summary>
    <description><![CDATA[<p>Don C. Weber, founder of Cutaway Security, joins the podcast to discuss his extensive career in information security, his journey to industrial control system cybersecurity, and his desire to educate, train and mentor others in the community.<br/>Weber’s business focuses on security services for industrial environments through program reviews, security assessments, penetration testing, and training. He is also a SANS instructor and a fixture at Black Hat/DEF CON and other major events. He also runs the excellent<a href='https://www.youtube.com/channel/UCIYSTYxNT3D6wVFVi5r5uaA'> Friday InfoSec Chats</a>, you can find those on Youtube. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Don C. Weber, founder of Cutaway Security, joins the podcast to discuss his extensive career in information security, his journey to industrial control system cybersecurity, and his desire to educate, train and mentor others in the community.<br/>Weber’s business focuses on security services for industrial environments through program reviews, security assessments, penetration testing, and training. He is also a SANS instructor and a fixture at Black Hat/DEF CON and other major events. He also runs the excellent<a href='https://www.youtube.com/channel/UCIYSTYxNT3D6wVFVi5r5uaA'> Friday InfoSec Chats</a>, you can find those on Youtube. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10798119-don-c-weber-on-ics-cybersecurity-training-education.mp3" length="33712577" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10798119</guid>
    <pubDate>Wed, 15 Jun 2022 18:00:00 -0400</pubDate>
    <podcast:soundbite startTime="598.883" duration="45.5" />
    <itunes:duration>2808</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)</itunes:title>
    <title>Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)</title>
    <itunes:summary><![CDATA[Tim Huddleston of Idaho National Laboratory joins the Aperture podcast to discuss the INL Control Environment Laboratory Resource (CELR). CELR is a simulated critical infrastructure environment where users may test their incident response capabilities against real-life attack scenarios. Users may also use the environment to conduct malware and vulnerability analysis of ICS and SCADA devices, and also test product capabilities against simulated cyber-physical attacks. Learn more about CELR her...]]></itunes:summary>
    <description><![CDATA[<p>Tim Huddleston of Idaho National Laboratory joins the Aperture podcast to discuss the INL Control Environment Laboratory Resource (CELR). CELR is a simulated critical infrastructure environment where users may test their incident response capabilities against real-life attack scenarios. Users may also use the environment to conduct malware and vulnerability analysis of ICS and SCADA devices, and also test product capabilities against simulated cyber-physical attacks. <a href='https://inl.gov/ics-celr/'>Learn more about CELR here</a>. <br/><br/><br/><br/></p><p><br/></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>Tim Huddleston of Idaho National Laboratory joins the Aperture podcast to discuss the INL Control Environment Laboratory Resource (CELR). CELR is a simulated critical infrastructure environment where users may test their incident response capabilities against real-life attack scenarios. Users may also use the environment to conduct malware and vulnerability analysis of ICS and SCADA devices, and also test product capabilities against simulated cyber-physical attacks. <a href='https://inl.gov/ics-celr/'>Learn more about CELR here</a>. <br/><br/><br/><br/></p><p><br/></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10721723-idaho-national-lab-on-the-inl-control-environment-laboratory-resource-celr.mp3" length="33151827" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10721723</guid>
    <pubDate>Thu, 02 Jun 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="485.833" duration="37.0" />
    <itunes:duration>2761</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework</itunes:title>
    <title>Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework</title>
    <itunes:summary><![CDATA[Thomas Schmidt of the German Federal Office for Information Security and Martin Scheu, an OT Security Engineer at SWITCH-CERT, join the podcast to discuss the Common Security Advisory Framework (CSAF).  CSAF automates the largely manual task of gathering security advisories and vulnerability remediation information, and then creates standardized, machine-readable advisories that users such as vendors and industry organizations can thus distribute to end users.    ]]></itunes:summary>
    <description><![CDATA[<p>Thomas Schmidt of the German Federal Office for Information Security and Martin Scheu, an OT Security Engineer at SWITCH-CERT, join the podcast to discuss the Common Security Advisory Framework (CSAF). <br/>CSAF automates the largely manual task of gathering security advisories and vulnerability remediation information, and then creates standardized, machine-readable advisories that users such as vendors and industry organizations can thus distribute to end users. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Thomas Schmidt of the German Federal Office for Information Security and Martin Scheu, an OT Security Engineer at SWITCH-CERT, join the podcast to discuss the Common Security Advisory Framework (CSAF). <br/>CSAF automates the largely manual task of gathering security advisories and vulnerability remediation information, and then creates standardized, machine-readable advisories that users such as vendors and industry organizations can thus distribute to end users. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10682862-thomas-schmidt-and-martin-scheu-on-the-common-security-advisory-framework.mp3" length="26282766" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10682862</guid>
    <pubDate>Thu, 26 May 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1503.0" duration="48.0" />
    <itunes:duration>2188</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools</itunes:title>
    <title>Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools</title>
    <itunes:summary><![CDATA[Mandiant senior technical analysis manager Daniel Kapellmann Zafra joins the Claroty Aperture podcast to discuss the Incontroller/Pipedream attack tool. Incontroller is alleged to be a state-sponsored tool specifically designed to target industrial control systems. Incontroller was discovered before it was employed on a victim's network, yet nonetheless it remains one of the most sophisticated, dangerous ICS attack platforms ever developed.   Kapellman Zafra discusses Incontroller's thre...]]></itunes:summary>
    <description><![CDATA[<p>Mandiant senior technical analysis manager Daniel Kapellmann Zafra joins the Claroty Aperture podcast to discuss the <a href='https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool'>Incontroller/Pipedream attack tool</a>. Incontroller is alleged to be a state-sponsored tool specifically designed to target industrial control systems. Incontroller was discovered before it was employed on a victim&apos;s network, yet nonetheless it remains one of the most sophisticated, dangerous ICS attack platforms ever developed. <br/><br/>Kapellman Zafra discusses Incontroller&apos;s three components—Tagrun, Codecall, and OmShell—that give it extreme flexibility in targeting different ICS equipment and communication protocols. You&apos;ll also learn about how resilient potential victims may be, as well as some of the mitigations and defensive strategies that organizations should consider.  <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Mandiant senior technical analysis manager Daniel Kapellmann Zafra joins the Claroty Aperture podcast to discuss the <a href='https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool'>Incontroller/Pipedream attack tool</a>. Incontroller is alleged to be a state-sponsored tool specifically designed to target industrial control systems. Incontroller was discovered before it was employed on a victim&apos;s network, yet nonetheless it remains one of the most sophisticated, dangerous ICS attack platforms ever developed. <br/><br/>Kapellman Zafra discusses Incontroller&apos;s three components—Tagrun, Codecall, and OmShell—that give it extreme flexibility in targeting different ICS equipment and communication protocols. You&apos;ll also learn about how resilient potential victims may be, as well as some of the mitigations and defensive strategies that organizations should consider.  <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10550280-daniel-kapellmann-zafra-on-incontroller-pipedream-ics-attack-tools.mp3" length="28407761" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10550280</guid>
    <pubDate>Wed, 04 May 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="602.583" duration="42.5" />
    <itunes:duration>2365</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sharon Brizinov on Hacking and Securing PLCs</itunes:title>
    <title>Sharon Brizinov on Hacking and Securing PLCs</title>
    <itunes:summary><![CDATA[In this episode of the Aperture podcast, Claroty Team82 vulnerability research lead Sharon Brizinov covers a presentation he’s giving at the S4x22 conference in Miami that explains a unique attack against Siemens SIMATIC 1200 and 1500 PLCs that enabled native code execution on the device.  Also, Brizinov explains his participation in the Pwn2Own contest. S4 hosts the only ICS-focused version of Pwn2Own, and this year there are four categories of targets in scope: control servers, OPC UA ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the Aperture podcast, Claroty Team82 vulnerability research lead Sharon Brizinov covers a presentation he’s giving at the S4x22 conference in Miami that explains a <a href='https://claroty.com/2021/05/28/blog-research-race-to-native-code-execution-in-plcs/'>unique attack against Siemens SIMATIC 1200 and 1500 PLCs</a> that enabled native code execution on the device. <br/>Also, Brizinov explains his participation in the Pwn2Own contest. S4 hosts the only ICS-focused version of Pwn2Own, and this year there are four categories of targets in scope: control servers, OPC UA servers, data gateways, and HMIs.<br/>“The goal in most cases is to achieve remote code execution, not only to find a vulnerability but achieve exploitation,” Brizinov said. “Usually we are able to find at least one vulnerability, but the real challenge is to exploit those vulnerabilities. Usually the difficulty around this is to bypass the different security mitigations that both the software, hardware, or operating system present.”</p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the Aperture podcast, Claroty Team82 vulnerability research lead Sharon Brizinov covers a presentation he’s giving at the S4x22 conference in Miami that explains a <a href='https://claroty.com/2021/05/28/blog-research-race-to-native-code-execution-in-plcs/'>unique attack against Siemens SIMATIC 1200 and 1500 PLCs</a> that enabled native code execution on the device. <br/>Also, Brizinov explains his participation in the Pwn2Own contest. S4 hosts the only ICS-focused version of Pwn2Own, and this year there are four categories of targets in scope: control servers, OPC UA servers, data gateways, and HMIs.<br/>“The goal in most cases is to achieve remote code execution, not only to find a vulnerability but achieve exploitation,” Brizinov said. “Usually we are able to find at least one vulnerability, but the real challenge is to exploit those vulnerabilities. Usually the difficulty around this is to bypass the different security mitigations that both the software, hardware, or operating system present.”</p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10440072-sharon-brizinov-on-hacking-and-securing-plcs.mp3" length="24752350" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10440072</guid>
    <pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1635.25" duration="22.0" />
    <itunes:duration>2061</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kylie McClanahan on Automating the Gathering of Vulnerability Information </itunes:title>
    <title>Kylie McClanahan on Automating the Gathering of Vulnerability Information </title>
    <itunes:summary><![CDATA[Kylie McClanahan, a University of Arkansas doctoral student and senior developer at Bastazo, joins the Aperture podcast to discuss her research into automating the gathering of vulnerability remediation and mitigation information from vendors and third-party sources.  McClanahan explains how she and colleagues have used machine learning, natural language processing, and keyword techniques, among others, to parse mitigation advice from vendor advisories and alerts from third-party sources such...]]></itunes:summary>
    <description><![CDATA[<p>Kylie McClanahan, a University of Arkansas doctoral student and senior developer at Bastazo, joins the Aperture podcast to discuss her research into automating the gathering of vulnerability remediation and mitigation information from vendors and third-party sources. <br/>McClanahan explains how she and colleagues have used machine learning, natural language processing, and keyword techniques, among others, to parse mitigation advice from vendor advisories and alerts from third-party sources such as NVD. <br/>These advisories often have incomplete mitigation information that&apos;s especially valuable in OT environments where asset owners must rely on mitigations when patches aren&apos;t either available or devices cannot be patched. <br/>McClanahan has coauthored two papers explaining different approaches to solving this problem that can be downloaded <a href='http://kyliemcclanahan.com/publications'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Kylie McClanahan, a University of Arkansas doctoral student and senior developer at Bastazo, joins the Aperture podcast to discuss her research into automating the gathering of vulnerability remediation and mitigation information from vendors and third-party sources. <br/>McClanahan explains how she and colleagues have used machine learning, natural language processing, and keyword techniques, among others, to parse mitigation advice from vendor advisories and alerts from third-party sources such as NVD. <br/>These advisories often have incomplete mitigation information that&apos;s especially valuable in OT environments where asset owners must rely on mitigations when patches aren&apos;t either available or devices cannot be patched. <br/>McClanahan has coauthored two papers explaining different approaches to solving this problem that can be downloaded <a href='http://kyliemcclanahan.com/publications'>here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10334593-kylie-mcclanahan-on-automating-the-gathering-of-vulnerability-information.mp3" length="29600528" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10334593</guid>
    <pubDate>Tue, 29 Mar 2022 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="410.633" duration="42.0" />
    <itunes:duration>2465</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sean Tufts on OT SOC Playbooks, Culture Challenges</itunes:title>
    <title>Sean Tufts on OT SOC Playbooks, Culture Challenges</title>
    <itunes:summary><![CDATA[Sean Tufts, ICS and OT security practice director at Optiv, joins the Claroty Aperture podcast to discuss some of the security technology and cultural challenges facing industrial enterprises as they deal with digital transformation and convergence.  Tufts, a former NFL player and college football star, also shares his non-conventional career path to OT cybersecurity and how some of the skills translate from pro sports to his second career.    ]]></itunes:summary>
    <description><![CDATA[<p>Sean Tufts, ICS and OT security practice director at Optiv, joins the Claroty Aperture podcast to discuss some of the security technology and cultural challenges facing industrial enterprises as they deal with digital transformation and convergence. <br/>Tufts, a former NFL player and college football star, also shares his non-conventional career path to OT cybersecurity and how some of the skills translate from pro sports to his second career. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Sean Tufts, ICS and OT security practice director at Optiv, joins the Claroty Aperture podcast to discuss some of the security technology and cultural challenges facing industrial enterprises as they deal with digital transformation and convergence. <br/>Tufts, a former NFL player and college football star, also shares his non-conventional career path to OT cybersecurity and how some of the skills translate from pro sports to his second career. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10123488-sean-tufts-on-ot-soc-playbooks-culture-challenges.mp3" length="29250021" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10123488</guid>
    <pubDate>Thu, 24 Feb 2022 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1267.0" duration="42.0" />
    <itunes:duration>2436</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Patrick Miller on Securing Critical Infrastructure in a Time of Conflict</itunes:title>
    <title>Patrick Miller on Securing Critical Infrastructure in a Time of Conflict</title>
    <itunes:summary><![CDATA[Veteran ICS cybersecurity expert Patrick Miller joins Claroty's Aperture podcast to discuss the proactive measures ICS cybersecurity managers and OT asset owners and operators should be taking right now in light of geopolitical tensions around the world.  Miller recently wrote a blog explaining what and how electric utilities and other CI organizations should be communicating and sharing in the event of conflict between Russia and Ukraine spilling over onto the internet. He elaborates on that...]]></itunes:summary>
    <description><![CDATA[<p>Veteran ICS cybersecurity expert Patrick Miller joins Claroty&apos;s Aperture podcast to discuss the proactive measures ICS cybersecurity managers and OT asset owners and operators should be taking right now in light of geopolitical tensions around the world. <br/>Miller recently wrote a <a href='https://www.amperesec.com/blog/communication-avalanche-what-utilities-need-to-think-about-before-a-nation-state-cyberattack-happens-to-them'>blog</a> explaining what and how electric utilities and other CI organizations should be communicating and sharing in the event of conflict between Russia and Ukraine spilling over onto the internet. He elaborates on that piece in this discussion, as well as his experience in helping to get the NERC CIP standards off the ground, how the standard may be ready to &quot;collapse under its own weight,&quot; 20 years later. <br/>-<br/><a href='https://join.slack.com/t/team82research/shared_invite/zt-13atrzhc6-AYbZ7lDk5DA3NJe~7KTJfQ'>Join Claroty Team82&apos;s Slack channel</a> and connect with our research team to discuss the latest in ICS and OT cybersecurity threat and vulnerability research. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Veteran ICS cybersecurity expert Patrick Miller joins Claroty&apos;s Aperture podcast to discuss the proactive measures ICS cybersecurity managers and OT asset owners and operators should be taking right now in light of geopolitical tensions around the world. <br/>Miller recently wrote a <a href='https://www.amperesec.com/blog/communication-avalanche-what-utilities-need-to-think-about-before-a-nation-state-cyberattack-happens-to-them'>blog</a> explaining what and how electric utilities and other CI organizations should be communicating and sharing in the event of conflict between Russia and Ukraine spilling over onto the internet. He elaborates on that piece in this discussion, as well as his experience in helping to get the NERC CIP standards off the ground, how the standard may be ready to &quot;collapse under its own weight,&quot; 20 years later. <br/>-<br/><a href='https://join.slack.com/t/team82research/shared_invite/zt-13atrzhc6-AYbZ7lDk5DA3NJe~7KTJfQ'>Join Claroty Team82&apos;s Slack channel</a> and connect with our research team to discuss the latest in ICS and OT cybersecurity threat and vulnerability research. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/10089572-patrick-miller-on-securing-critical-infrastructure-in-a-time-of-conflict.mp3" length="31093579" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10089572</guid>
    <pubDate>Thu, 17 Feb 2022 12:00:00 -0500</pubDate>
    <podcast:soundbite startTime="781.0" duration="43.0" />
    <itunes:duration>2589</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>OT-ISAC on Information-Sharing, Incident Recovery</itunes:title>
    <title>OT-ISAC on Information-Sharing, Incident Recovery</title>
    <itunes:summary><![CDATA[Bill Nelson, director and officer of the OT-ISAC, joins the podcast to discuss the growing need for adequate sharing of threat intelligence and incident information among operational technology professionals, including asset owners and security practitioners.  Nelson explains some of the information-sharing challenges that continue to shadow ISACs, and why member organizations may be hesitant to share incident details. He also discusses a new operational resilience framework in development th...]]></itunes:summary>
    <description><![CDATA[<p>Bill Nelson, director and officer of the OT-ISAC, joins the podcast to discuss the growing need for adequate sharing of threat intelligence and incident information among operational technology professionals, including asset owners and security practitioners. <br/>Nelson explains some of the information-sharing challenges that continue to shadow ISACs, and why member organizations may be hesitant to share incident details. He also discusses a new operational resilience framework in development that will soon be released for public comment and feedback, and how that ties into the need for more discussions on incident response and recovery. <br/>--<br/>Claroty&apos;s research arm, Team82, invites you to join its new Slack channel where you can join other OT, ICS, and IoT cybersecurity experts to discuss the team&apos;s research, vulnerability disclosures, and best practices. <a href='https://join.slack.com/t/team82research/shared_invite/zt-11fv7uqlw-_8LwKMdX~O4LeGYpbKFS_w'>Click here to join</a>. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Bill Nelson, director and officer of the OT-ISAC, joins the podcast to discuss the growing need for adequate sharing of threat intelligence and incident information among operational technology professionals, including asset owners and security practitioners. <br/>Nelson explains some of the information-sharing challenges that continue to shadow ISACs, and why member organizations may be hesitant to share incident details. He also discusses a new operational resilience framework in development that will soon be released for public comment and feedback, and how that ties into the need for more discussions on incident response and recovery. <br/>--<br/>Claroty&apos;s research arm, Team82, invites you to join its new Slack channel where you can join other OT, ICS, and IoT cybersecurity experts to discuss the team&apos;s research, vulnerability disclosures, and best practices. <a href='https://join.slack.com/t/team82research/shared_invite/zt-11fv7uqlw-_8LwKMdX~O4LeGYpbKFS_w'>Click here to join</a>. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9968662-ot-isac-on-information-sharing-incident-recovery.mp3" length="29708598" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-9968662</guid>
    <pubDate>Sun, 30 Jan 2022 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="395.05" duration="30.5" />
    <itunes:duration>2474</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tom VanNorman on OT Cybersecurity Skills Gap</itunes:title>
    <title>Tom VanNorman on OT Cybersecurity Skills Gap</title>
    <itunes:summary><![CDATA[ICS Village cofounder Tom VanNorman joins the Aperture podcast to discuss the recently announced Cybersecurity &amp; Industrial Infrastructure Security Apprenticeship Program that aims to improve cybersecurity knowledge within operational technology. ICS Village is part of a consortium behind this apprenticeship program along with Siemens Energy, SANS Institute, and a number of academic institutions. The aim is to integrate academic classes, training, and real-world job rotations at leading i...]]></itunes:summary>
    <description><![CDATA[<p>ICS Village cofounder Tom VanNorman joins the Aperture podcast to discuss the recently announced Cybersecurity &amp; Industrial Infrastructure Security Apprenticeship Program that aims to improve cybersecurity knowledge within operational technology. ICS Village is part of a consortium behind this apprenticeship program along with Siemens Energy, SANS Institute, and a number of academic institutions. The aim is to integrate academic classes, training, and real-world job rotations at leading industrial companies. <br/>Tom also discusses the next iteration of ICS Village at the upcoming RSA Conference in June. </p>]]></description>
    <content:encoded><![CDATA[<p>ICS Village cofounder Tom VanNorman joins the Aperture podcast to discuss the recently announced Cybersecurity &amp; Industrial Infrastructure Security Apprenticeship Program that aims to improve cybersecurity knowledge within operational technology. ICS Village is part of a consortium behind this apprenticeship program along with Siemens Energy, SANS Institute, and a number of academic institutions. The aim is to integrate academic classes, training, and real-world job rotations at leading industrial companies. <br/>Tom also discusses the next iteration of ICS Village at the upcoming RSA Conference in June. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9869675-tom-vannorman-on-ot-cybersecurity-skills-gap.mp3" length="28870084" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9869675</guid>
    <pubDate>Wed, 12 Jan 2022 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="760.2" duration="57.0" />
    <itunes:duration>2404</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Claroty, JFrog on Fuzzing BusyBox</itunes:title>
    <title>Claroty, JFrog on Fuzzing BusyBox</title>
    <itunes:summary><![CDATA[Claroty researcher Vera Mens and JFrog researcher Shachar Menashe join the podcast to discuss a recent research collaboration between the two companies that looked at the security of BusyBox.  Busybox is a popular embedded Linux utility suite, and is found everywhere in operational technology, including in devices such as PLCs, HMIs, and RTUs. The researchers published a paper that describes 14 vulnerabilities uncovered in BusyBox—all of which were patched—and the custom fuzzing harnesses use...]]></itunes:summary>
    <description><![CDATA[<p>Claroty researcher Vera Mens and JFrog researcher Shachar Menashe join the podcast to discuss a recent research collaboration between the two companies that looked at the security of BusyBox. <br/>Busybox is a popular embedded Linux utility suite, and is found everywhere in operational technology, including in devices such as PLCs, HMIs, and RTUs.<br/><a href='https://claroty.com/2021/11/09/blog-research-unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog/'>The researchers published a paper</a> that describes 14 vulnerabilities uncovered in BusyBox—all of which were patched—and the custom fuzzing harnesses used to trigger the bugs. The harnesses were released to open source by Claroty and can be found on <a href='https://github.com/claroty/busybox-fuzzing'>GitHub</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Claroty researcher Vera Mens and JFrog researcher Shachar Menashe join the podcast to discuss a recent research collaboration between the two companies that looked at the security of BusyBox. <br/>Busybox is a popular embedded Linux utility suite, and is found everywhere in operational technology, including in devices such as PLCs, HMIs, and RTUs.<br/><a href='https://claroty.com/2021/11/09/blog-research-unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog/'>The researchers published a paper</a> that describes 14 vulnerabilities uncovered in BusyBox—all of which were patched—and the custom fuzzing harnesses used to trigger the bugs. The harnesses were released to open source by Claroty and can be found on <a href='https://github.com/claroty/busybox-fuzzing'>GitHub</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9593554-claroty-jfrog-on-fuzzing-busybox.mp3" length="27921817" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9593554</guid>
    <pubDate>Sun, 28 Nov 2021 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="1040.483" duration="45.5" />
    <itunes:duration>2325</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ZDI&#39;s Dustin Childs on Pwn2Own Miami</itunes:title>
    <title>ZDI&#39;s Dustin Childs on Pwn2Own Miami</title>
    <itunes:summary><![CDATA[Dustin Childs of the Zero Day Initiative (ZDI) joins Claroty's Aperture podcast to discuss the upcoming Pwn2Own Miami hacking contest. This is the only hacking contest focused on finding zero-day vulnerabilities in industrial control systems (ICS) and operational technology (OT), and it will be held during the S4 conference in January.   Childs is a veteran of the security industry and Pwn2Own, which is 16 years old. Pwn2Own Miami will be the second such event with an ICS focus. Research...]]></itunes:summary>
    <description><![CDATA[<p>Dustin Childs of the Zero Day Initiative (ZDI) joins Claroty&apos;s Aperture podcast to discuss the upcoming <a href='https://www.zerodayinitiative.com/blog/2021/10/22/our-ics-themed-pwn2own-contest-returns-to-miami-in-2022'>Pwn2Own Miami hacking contest</a>. This is the only hacking contest focused on finding zero-day vulnerabilities in industrial control systems (ICS) and operational technology (OT), and it will be held during the S4 conference in January. <br/><br/>Childs is a veteran of the security industry and Pwn2Own, which is 16 years old. Pwn2Own Miami will be the second such event with an ICS focus. Researchers will compete for a prize pool over more than $300,000; four technology categories are in scope at this year&apos;s event: control servers, OPC servers, data gateways, and HMIs. <br/><br/>Childs explains Pwn2Own Miami&apos;s hybrid approach that will allow competitors to enter either virtually or on-site, how Pwn2Own works, and what the disclosure process is like with affected vendors once a zero-day is demonstrated. <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Dustin Childs of the Zero Day Initiative (ZDI) joins Claroty&apos;s Aperture podcast to discuss the upcoming <a href='https://www.zerodayinitiative.com/blog/2021/10/22/our-ics-themed-pwn2own-contest-returns-to-miami-in-2022'>Pwn2Own Miami hacking contest</a>. This is the only hacking contest focused on finding zero-day vulnerabilities in industrial control systems (ICS) and operational technology (OT), and it will be held during the S4 conference in January. <br/><br/>Childs is a veteran of the security industry and Pwn2Own, which is 16 years old. Pwn2Own Miami will be the second such event with an ICS focus. Researchers will compete for a prize pool over more than $300,000; four technology categories are in scope at this year&apos;s event: control servers, OPC servers, data gateways, and HMIs. <br/><br/>Childs explains Pwn2Own Miami&apos;s hybrid approach that will allow competitors to enter either virtually or on-site, how Pwn2Own works, and what the disclosure process is like with affected vendors once a zero-day is demonstrated. <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9527135-zdi-s-dustin-childs-on-pwn2own-miami.mp3" length="25720014" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9527135</guid>
    <pubDate>Mon, 15 Nov 2021 00:00:00 -0500</pubDate>
    <itunes:duration>2142</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Exploring and Navigating OT for CISOs</itunes:title>
    <title>Exploring and Navigating OT for CISOs</title>
    <itunes:summary><![CDATA[Splunk OT security strategist Chris Duffey and Global Advisory CISO Doug Brush join Claroty's Aperture podcast to discuss how CISOs can and must navigate the world of industrial control system (ICS) and operational technology cybersecurity.   Digital transformation and convergence have forced IT and OT under the same umbrella for many industrial enterprises and critical infrastructure. For many CISOs, managing OT cybersecurity is a whole new world of risk management strategies, technolog...]]></itunes:summary>
    <description><![CDATA[<p>Splunk OT security strategist Chris Duffey and Global Advisory CISO Doug Brush join Claroty&apos;s Aperture podcast to discuss how CISOs can and must navigate the world of industrial control system (ICS) and operational technology cybersecurity. <br/><br/>Digital transformation and convergence have forced IT and OT under the same umbrella for many industrial enterprises and critical infrastructure. For many CISOs, managing OT cybersecurity is a whole new world of risk management strategies, technologies, and vendors. <br/><br/>Duffey and Brush explain some of the success stories they&apos;ve experienced with CISOs who have had to close knowledge, technology, and experience gaps in order to meet OT security challenges head-on.  There are numerous considerations from both an operational and strategic point of view, and Duffey and Brush share their experiences. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Splunk OT security strategist Chris Duffey and Global Advisory CISO Doug Brush join Claroty&apos;s Aperture podcast to discuss how CISOs can and must navigate the world of industrial control system (ICS) and operational technology cybersecurity. <br/><br/>Digital transformation and convergence have forced IT and OT under the same umbrella for many industrial enterprises and critical infrastructure. For many CISOs, managing OT cybersecurity is a whole new world of risk management strategies, technologies, and vendors. <br/><br/>Duffey and Brush explain some of the success stories they&apos;ve experienced with CISOs who have had to close knowledge, technology, and experience gaps in order to meet OT security challenges head-on.  There are numerous considerations from both an operational and strategic point of view, and Duffey and Brush share their experiences. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9519827-exploring-and-navigating-ot-for-cisos.mp3" length="30276921" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9519827</guid>
    <pubDate>Wed, 10 Nov 2021 00:00:00 -0500</pubDate>
    <podcast:soundbite startTime="739.3" duration="30.0" />
    <itunes:duration>2521</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Gary E. Miller on the GPSD Bug</itunes:title>
    <title>Gary E. Miller on the GPSD Bug</title>
    <itunes:summary><![CDATA[Gary E. Miller, principal maintainer of GPSD, joins the Aperture Podcast to discuss a bug in this service that potentially could have caused some disruptions on devices that rely on global positioning systems for precise time-keeping.  GPSD is a service daemon that extracts time information from GPS appliances. GPSD can be found in anything from mobile phones, to submarine navigation systems, and satellites. There are also industrial applications that reply on GPS for timing, including f...]]></itunes:summary>
    <description><![CDATA[<p>Gary E. Miller, principal maintainer of GPSD, joins the Aperture Podcast to discuss a bug in this service that potentially could have caused some disruptions on devices that rely on global positioning systems for precise time-keeping. <br/>GPSD is a service daemon that extracts time information from GPS appliances. GPSD can be found in anything from mobile phones, to submarine navigation systems, and satellites. There are also industrial applications that reply on GPS for timing, including flow meters in pipelines, for example. <br/>A bug was discovered earlier this year in the GPSD code that could have rolled back time on GPS-reliant devices starting Oct. 24 to March 2002. Such an event could have affected data integrity with systems dependent on timestamps, for example. Some sensors transmit data regularly and are part of larger systems that take actions based on sensor readings. <br/>Miller explains how GPSD works, the intricacies of the bug, and why there haven&apos;t been  incidents related to the bug since Oct. 24.</p>]]></description>
    <content:encoded><![CDATA[<p>Gary E. Miller, principal maintainer of GPSD, joins the Aperture Podcast to discuss a bug in this service that potentially could have caused some disruptions on devices that rely on global positioning systems for precise time-keeping. <br/>GPSD is a service daemon that extracts time information from GPS appliances. GPSD can be found in anything from mobile phones, to submarine navigation systems, and satellites. There are also industrial applications that reply on GPS for timing, including flow meters in pipelines, for example. <br/>A bug was discovered earlier this year in the GPSD code that could have rolled back time on GPS-reliant devices starting Oct. 24 to March 2002. Such an event could have affected data integrity with systems dependent on timestamps, for example. Some sensors transmit data regularly and are part of larger systems that take actions based on sensor readings. <br/>Miller explains how GPSD works, the intricacies of the bug, and why there haven&apos;t been  incidents related to the bug since Oct. 24.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9439129-gary-e-miller-on-the-gpsd-bug.mp3" length="28369446" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9439129</guid>
    <pubDate>Wed, 27 Oct 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1211.817" duration="35.5" />
    <itunes:duration>2362</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Top 20 Secure PLC Coding Practices List</itunes:title>
    <title>Top 20 Secure PLC Coding Practices List</title>
    <itunes:summary><![CDATA[Martin Scheu and Dirk Rotermund of the Top 20 Secure PLC Coding Practices project join Claroty's Aperture podcast to discuss how engineers can integrate secure coding practices into PLC programming.  The group's list of secure coding practices was released earlier this year and is available as a free download. It’s a 44-page document that includes not only the list of secure coding practices, but also detailed guidance for each, and where they map to on certain frameworks such as MITRE ATT&am...]]></itunes:summary>
    <description><![CDATA[<p>Martin Scheu and Dirk Rotermund of the <a href='https://www.plc-security.com/'>Top 20 Secure PLC Coding Practices</a> project join Claroty&apos;s Aperture podcast to discuss how engineers can integrate secure coding practices into PLC programming. <br/>The group&apos;s list of secure coding practices was released earlier this year and is available as a free <a href='https://www.plc-security.com/'>download</a>. It’s a 44-page document that includes not only the list of secure coding practices, but also detailed guidance for each, and where they map to on certain frameworks such as MITRE ATT&amp;CK. <br/>In this discussion, you&apos;ll learn more about how this project came together, the current state of PLC security by design, where current cybersecurity gaps exist, and how engineers can best make use of the guidance provided in the list of secure coding practices. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Martin Scheu and Dirk Rotermund of the <a href='https://www.plc-security.com/'>Top 20 Secure PLC Coding Practices</a> project join Claroty&apos;s Aperture podcast to discuss how engineers can integrate secure coding practices into PLC programming. <br/>The group&apos;s list of secure coding practices was released earlier this year and is available as a free <a href='https://www.plc-security.com/'>download</a>. It’s a 44-page document that includes not only the list of secure coding practices, but also detailed guidance for each, and where they map to on certain frameworks such as MITRE ATT&amp;CK. <br/>In this discussion, you&apos;ll learn more about how this project came together, the current state of PLC security by design, where current cybersecurity gaps exist, and how engineers can best make use of the guidance provided in the list of secure coding practices. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9274345-top-20-secure-plc-coding-practices-list.mp3" length="29151570" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9274345</guid>
    <pubDate>Tue, 28 Sep 2021 13:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1474.0" duration="30.0" />
    <itunes:duration>2427</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dennis Fisher on &#39;When Bug Bounties Went Boom&#39;</itunes:title>
    <title>Dennis Fisher on &#39;When Bug Bounties Went Boom&#39;</title>
    <itunes:summary><![CDATA[Decipher Editor in Chief Dennis Fisher joins the podcast to discuss a series he recently published on the history and evolution of bug bounties. In the series, Dennis talks to the hackers and researchers who took an idea and turned it into one of information security's most well-known and lucrative industries.  In this episode, Fisher covers the early days of bug bounties, the No More Free Bugs movement, the legal landmines researchers faced doing vulnerability research—essentially for free—t...]]></itunes:summary>
    <description><![CDATA[<p>Decipher Editor in Chief Dennis Fisher joins the podcast to discuss a series he recently published on the history and evolution of bug bounties. In the series, Dennis talks to the hackers and researchers who took an idea and turned it into one of information security&apos;s most well-known and lucrative industries. <br/>In this episode, Fisher covers the early days of bug bounties, the No More Free Bugs movement, the legal landmines researchers faced doing vulnerability research—essentially for free—the gray markets for bugs and exploits, and how pioneers such as Katie Moussouris worked tirelessly to make bug bounty programs a reality not only at Microsoft, but also within the Pentagon. <br/>Read the three-part series at Decipher:<br/><a href='https://duo.com/decipher/lawyers-bugs-and-money-when-bug-bounties-went-boom'>&quot;Lawyers, Bugs, and Money: When Bug Bounties Went Boom, Part 1&quot;</a><br/><a href='https://duo.com/decipher/uprising-in-the-valley-when-bug-bounties-went-boom-part-two'>&quot;Uprising in the Valley: When Bug Bounties Went Boom, Part 2&quot;</a><br/><a href='https://duo.com/decipher/you-got-to-drive-it-like-you-stole-it-when-bug-bounties-went-boom-part-three'>&quot;Drive it Like You Stole It: When Bug Bounties Went Boom, Part 3&quot;</a></p>]]></description>
    <content:encoded><![CDATA[<p>Decipher Editor in Chief Dennis Fisher joins the podcast to discuss a series he recently published on the history and evolution of bug bounties. In the series, Dennis talks to the hackers and researchers who took an idea and turned it into one of information security&apos;s most well-known and lucrative industries. <br/>In this episode, Fisher covers the early days of bug bounties, the No More Free Bugs movement, the legal landmines researchers faced doing vulnerability research—essentially for free—the gray markets for bugs and exploits, and how pioneers such as Katie Moussouris worked tirelessly to make bug bounty programs a reality not only at Microsoft, but also within the Pentagon. <br/>Read the three-part series at Decipher:<br/><a href='https://duo.com/decipher/lawyers-bugs-and-money-when-bug-bounties-went-boom'>&quot;Lawyers, Bugs, and Money: When Bug Bounties Went Boom, Part 1&quot;</a><br/><a href='https://duo.com/decipher/uprising-in-the-valley-when-bug-bounties-went-boom-part-two'>&quot;Uprising in the Valley: When Bug Bounties Went Boom, Part 2&quot;</a><br/><a href='https://duo.com/decipher/you-got-to-drive-it-like-you-stole-it-when-bug-bounties-went-boom-part-three'>&quot;Drive it Like You Stole It: When Bug Bounties Went Boom, Part 3&quot;</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9212888-dennis-fisher-on-when-bug-bounties-went-boom.mp3" length="30334617" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9212888</guid>
    <pubDate>Mon, 20 Sep 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="761.954" duration="41.0" />
    <itunes:duration>2526</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tom Pace on SBOMs for ICS and OT</itunes:title>
    <title>Tom Pace on SBOMs for ICS and OT</title>
    <itunes:summary><![CDATA[Tom Pace, founder of security company NetRise joins Claroty's Aperture Podcast to discuss SBOMs, or software bill of materials, and how they can be leveraged to improve industrial control system and operational technology cybersecurity.   SBOMs are analogous to ingredient labels on food products, or parts lists for automobiles. Yet for ICS and OT equipment, they are a rarity. That lack of visibility into software and firmware components puts organizations at risk in the event of an incident, ...]]></itunes:summary>
    <description><![CDATA[<p>Tom Pace, founder of security company NetRise joins Claroty&apos;s Aperture Podcast to discuss SBOMs, or software bill of materials, and how they can be leveraged to improve industrial control system and operational technology cybersecurity. <br/><br/>SBOMs are analogous to ingredient labels on food products, or parts lists for automobiles. Yet for ICS and OT equipment, they are a rarity. That lack of visibility into software and firmware components puts organizations at risk in the event of an incident, or can hamper risk management efforts. <br/><br/>Pace discusses the value proposition of SBOMs, how they can be created and consumed inside industrial enterprises, and takes down some misconceptions vendors and buyers may have around SBOMs giving attackers a network roadmap, or leaking intellectual property secrets. <br/><br/>Pace also covered this subject in a talk at the recent <a href='https://www.youtube.com/watch?v=jLd9SMFA1x4'>ICS Village at DEFCON</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Tom Pace, founder of security company NetRise joins Claroty&apos;s Aperture Podcast to discuss SBOMs, or software bill of materials, and how they can be leveraged to improve industrial control system and operational technology cybersecurity. <br/><br/>SBOMs are analogous to ingredient labels on food products, or parts lists for automobiles. Yet for ICS and OT equipment, they are a rarity. That lack of visibility into software and firmware components puts organizations at risk in the event of an incident, or can hamper risk management efforts. <br/><br/>Pace discusses the value proposition of SBOMs, how they can be created and consumed inside industrial enterprises, and takes down some misconceptions vendors and buyers may have around SBOMs giving attackers a network roadmap, or leaking intellectual property secrets. <br/><br/>Pace also covered this subject in a talk at the recent <a href='https://www.youtube.com/watch?v=jLd9SMFA1x4'>ICS Village at DEFCON</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9060716-tom-pace-on-sboms-for-ics-and-ot.mp3" length="35279255" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9060716</guid>
    <pubDate>Sun, 22 Aug 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="393.0" duration="35.0" />
    <itunes:duration>2938</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tony Baker on OT Cybersecurity Challenges, CIP Security</itunes:title>
    <title>Tony Baker on OT Cybersecurity Challenges, CIP Security</title>
    <itunes:summary><![CDATA[Rockwell Automation Chief Product Safety and Security Officer Tony Baker joins the Claroty Aperture podcast to discuss the rash of cybersecurity challenges facing critical infrastructure and industry owners and operators.  Baker is a Rockwell veteran and has specialized in cybersecurity for the last eight years. He shares his insight on some of the challenges and resource gaps defenders are facing today, as well as the short- and long-term impact of the high-profile industrial cybersecur...]]></itunes:summary>
    <description><![CDATA[<p>Rockwell Automation Chief Product Safety and Security Officer Tony Baker joins the Claroty Aperture podcast to discuss the rash of cybersecurity challenges facing critical infrastructure and industry owners and operators. <br/>Baker is a Rockwell veteran and has specialized in cybersecurity for the last eight years. He shares his insight on some of the challenges and resource gaps defenders are facing today, as well as the short- and long-term impact of the high-profile industrial cybersecurity incidents that have dominated headlines in 2021. <br/>Baker also discusses the evolution and adoption of CIP Security, a critical defense-in-depth technology that brings authentication, integrity, and confidentiality to messaging between industrial devices. </p>]]></description>
    <content:encoded><![CDATA[<p>Rockwell Automation Chief Product Safety and Security Officer Tony Baker joins the Claroty Aperture podcast to discuss the rash of cybersecurity challenges facing critical infrastructure and industry owners and operators. <br/>Baker is a Rockwell veteran and has specialized in cybersecurity for the last eight years. He shares his insight on some of the challenges and resource gaps defenders are facing today, as well as the short- and long-term impact of the high-profile industrial cybersecurity incidents that have dominated headlines in 2021. <br/>Baker also discusses the evolution and adoption of CIP Security, a critical defense-in-depth technology that brings authentication, integrity, and confidentiality to messaging between industrial devices. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/9007805-tony-baker-on-ot-cybersecurity-challenges-cip-security.mp3" length="26986155" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9007805</guid>
    <pubDate>Tue, 10 Aug 2021 18:00:00 -0400</pubDate>
    <podcast:soundbite startTime="1694.536" duration="38.0" />
    <itunes:duration>2247</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside the Water Sector Cybersecurity Survey</itunes:title>
    <title>Inside the Water Sector Cybersecurity Survey</title>
    <itunes:summary><![CDATA[Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center (WaterISAC), joins Claroty's Aperture podcast for a deep dive into the results of the recently released Water Sector Coordinating Council's cybersecurity survey.   In short, the water sector needs cybersecurity help from industry organizations and the federal government. Respondents, identified four critical areas of need ranging from training, to improved cybersecurity tools and threat information,...]]></itunes:summary>
    <description><![CDATA[<p>Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center (WaterISAC), joins Claroty&apos;s Aperture podcast for a deep dive into the results of the recently released <a href='https://www.waterisac.org/system/files/articles/FINAL_2021_WaterSectorCoordinatingCouncil_Cybersecurity_State_of_the_Industry-17-JUN-2021.pdf'>Water Sector Coordinating Council&apos;s cybersecurity survey</a>. <br/><br/>In short, the water sector needs cybersecurity help from industry organizations and the federal government. Respondents, identified four critical areas of need ranging from training, to improved cybersecurity tools and threat information, to money allocated from the federal government via loans and grants. <br/><br/>While there were encouraging signs around the amount of risk assessment happening within the sector, that&apos;s offset by data that shows a lack of visibility into connected IT and OT assets. Water utilities are exposed to threats from threat actors, and respondents want to minimize the exposure of control systems, identify and remediate vulnerabilities, and secure remote access to OT systems. </p>]]></description>
    <content:encoded><![CDATA[<p>Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center (WaterISAC), joins Claroty&apos;s Aperture podcast for a deep dive into the results of the recently released <a href='https://www.waterisac.org/system/files/articles/FINAL_2021_WaterSectorCoordinatingCouncil_Cybersecurity_State_of_the_Industry-17-JUN-2021.pdf'>Water Sector Coordinating Council&apos;s cybersecurity survey</a>. <br/><br/>In short, the water sector needs cybersecurity help from industry organizations and the federal government. Respondents, identified four critical areas of need ranging from training, to improved cybersecurity tools and threat information, to money allocated from the federal government via loans and grants. <br/><br/>While there were encouraging signs around the amount of risk assessment happening within the sector, that&apos;s offset by data that shows a lack of visibility into connected IT and OT assets. Water utilities are exposed to threats from threat actors, and respondents want to minimize the exposure of control systems, identify and remediate vulnerabilities, and secure remote access to OT systems. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8797917-inside-the-water-sector-cybersecurity-survey.mp3" length="24441075" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8797917</guid>
    <pubDate>Fri, 02 Jul 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="713.217" duration="23.0" />
    <itunes:duration>2035</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Adm. Mike Rogers on Ransomware and OT</itunes:title>
    <title>Adm. Mike Rogers on Ransomware and OT</title>
    <itunes:summary><![CDATA[Retired Adm. Mike Rogers, former NSA Director and U.S. Cyber Command Commander, joins Claroty's Aperture Podcast to lend his insight and expertise into the rash of ransomware attacks starting to impact operational technology (OT) environments and critical infrastructure.   Rogers covers the risk assessments that industrial enterprises are undertaking to handle the ransomware threat, and how to best response in the event of an incident. The discussion also ranges into: Cyber resilience in...]]></itunes:summary>
    <description><![CDATA[<p>Retired Adm. Mike Rogers, former NSA Director and U.S. Cyber Command Commander, joins Claroty&apos;s Aperture Podcast to lend his insight and expertise into the rash of ransomware attacks starting to impact operational technology (OT) environments and critical infrastructure. <br/><br/>Rogers covers the risk assessments that industrial enterprises are undertaking to handle the ransomware threat, and how to best response in the event of an incident. The discussion also ranges into:</p><ul><li>Cyber resilience in OT environments</li><li>The debate on whether to pay extortion demands or ransoms</li><li>The role of cyber-insurance is playing in defensive strategies, </li><li>How the government should be working with private sector critical infrastructure operators. </li></ul><p>Rogers is also the chairman of Claroty&apos;s board of advisors. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Retired Adm. Mike Rogers, former NSA Director and U.S. Cyber Command Commander, joins Claroty&apos;s Aperture Podcast to lend his insight and expertise into the rash of ransomware attacks starting to impact operational technology (OT) environments and critical infrastructure. <br/><br/>Rogers covers the risk assessments that industrial enterprises are undertaking to handle the ransomware threat, and how to best response in the event of an incident. The discussion also ranges into:</p><ul><li>Cyber resilience in OT environments</li><li>The debate on whether to pay extortion demands or ransoms</li><li>The role of cyber-insurance is playing in defensive strategies, </li><li>How the government should be working with private sector critical infrastructure operators. </li></ul><p>Rogers is also the chairman of Claroty&apos;s board of advisors. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8759603-adm-mike-rogers-on-ransomware-and-ot.mp3" length="30788816" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8759603</guid>
    <pubDate>Fri, 25 Jun 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="454.667" duration="52.0" />
    <itunes:duration>2564</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mandiant on Low-Sophistication OT Attacks</itunes:title>
    <title>Mandiant on Low-Sophistication OT Attacks</title>
    <itunes:summary><![CDATA[Mandiant Threat Intelligence Senior Manager Nathan Brubaker joins the Aperture Podcast to discuss the growing trend of low-sophistication attacks targeting operational technology and industrial control systems.   Nathan coauthored a recent Mandiant report on the subject, identifying a number of trends worth monitoring as industrial enterprises continue to connect OT to the internet and converge IT and OT systems internally.   Attackers are exploiting connectivity to sometimes interact wi...]]></itunes:summary>
    <description><![CDATA[<p>Mandiant Threat Intelligence Senior Manager Nathan Brubaker joins the Aperture Podcast to discuss the growing trend of low-sophistication attacks targeting operational technology and industrial control systems. <br/><br/>Nathan coauthored a recent <a href='https://www.fireeye.com/blog/threat-research/2021/05/increasing-low-sophistication-operational-technology-compromises.html'>Mandiant report</a> on the subject, identifying a number of trends worth monitoring as industrial enterprises continue to connect OT to the internet and converge IT and OT systems internally. <br/><br/>Attackers are exploiting connectivity to sometimes interact with industrial processes, but more often to capitalize financially on their access through ransomware, or to gather information about exposed assets that can be shared or sold. <br/><br/>Nathan also discusses some of the commodity tools attackers are using to compromise control systems and industrial assets, and what organizations can do to lock down OT systems and reduce risk to industrial processes. </p>]]></description>
    <content:encoded><![CDATA[<p>Mandiant Threat Intelligence Senior Manager Nathan Brubaker joins the Aperture Podcast to discuss the growing trend of low-sophistication attacks targeting operational technology and industrial control systems. <br/><br/>Nathan coauthored a recent <a href='https://www.fireeye.com/blog/threat-research/2021/05/increasing-low-sophistication-operational-technology-compromises.html'>Mandiant report</a> on the subject, identifying a number of trends worth monitoring as industrial enterprises continue to connect OT to the internet and converge IT and OT systems internally. <br/><br/>Attackers are exploiting connectivity to sometimes interact with industrial processes, but more often to capitalize financially on their access through ransomware, or to gather information about exposed assets that can be shared or sold. <br/><br/>Nathan also discusses some of the commodity tools attackers are using to compromise control systems and industrial assets, and what organizations can do to lock down OT systems and reduce risk to industrial processes. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8660839-mandiant-on-low-sophistication-ot-attacks.mp3" length="30380687" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8660839</guid>
    <pubDate>Tue, 08 Jun 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="521.185" duration="24.5" />
    <itunes:duration>2530</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity </itunes:title>
    <title>E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity </title>
    <itunes:summary><![CDATA[Manny Cancel, CEO of the Electricity-ISAC, joins the Aperture podcast for a wide-ranging discussion on cybersecurity issues affecting electricity utilities and critical infrastructure. Cancel shares his thoughts on the Biden Administration's recent announcement of a 100-day plan to improve electricity and power grid cybersecurity. Specifically, the plan calls for the identification and deployment of technologies and systems that improve situational awareness and response capabilities for elec...]]></itunes:summary>
    <description><![CDATA[<p>Manny Cancel, CEO of the Electricity-ISAC, joins the Aperture podcast for a wide-ranging discussion on cybersecurity issues affecting electricity utilities and critical infrastructure. Cancel shares his thoughts on the Biden Administration&apos;s recent announcement of a 100-day plan to improve electricity and power grid cybersecurity. Specifically, the plan calls for the identification and deployment of technologies and systems that improve situational awareness and response capabilities for electricity providers. Cancel also discusses threats facing electric utilities, threat actors targeting the sector, and what technology and human-resource gaps exist. Finally, Cancel describes how the E-ISAC works with its members on information-sharing, and activities among its 1,100 members. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Manny Cancel, CEO of the Electricity-ISAC, joins the Aperture podcast for a wide-ranging discussion on cybersecurity issues affecting electricity utilities and critical infrastructure. Cancel shares his thoughts on the Biden Administration&apos;s recent announcement of a 100-day plan to improve electricity and power grid cybersecurity. Specifically, the plan calls for the identification and deployment of technologies and systems that improve situational awareness and response capabilities for electricity providers. Cancel also discusses threats facing electric utilities, threat actors targeting the sector, and what technology and human-resource gaps exist. Finally, Cancel describes how the E-ISAC works with its members on information-sharing, and activities among its 1,100 members. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8536318-e-isac-on-biden-100-day-plan-for-power-grid-cybersecurity.mp3" length="24009769" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8536318</guid>
    <pubDate>Tue, 18 May 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="632.0" duration="22.0" />
    <itunes:duration>1999</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress</itunes:title>
    <title>Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress</title>
    <itunes:summary><![CDATA[Luta Security founder, security entrepreneur, and vulnerability disclosure pioneer Katie Moussouris joins the Aperture Podcast to talk about influential researcher Dan Kaminsky, who died April 23 at 42 years old. Katie discusses the breadth of Dan's work as a researcher, and his friendship, empathy, and outreach within the security community.  Katie also talks about her work advocating for pay, gender and employment equity, and how her mother persevered as a single mother earning signifi...]]></itunes:summary>
    <description><![CDATA[<p>Luta Security founder, security entrepreneur, and vulnerability disclosure pioneer Katie Moussouris joins the Aperture Podcast to talk about influential researcher Dan Kaminsky, who died April 23 at 42 years old. Katie discusses the breadth of Dan&apos;s work as a researcher, and his friendship, empathy, and outreach within the security community. <br/>Katie also talks about her work advocating for pay, gender and employment equity, and how her mother persevered as a single mother earning significantly less than male counterparts. <br/>Katie also explains her return to her hacker roots uncovering two serious vulnerabilities in the audio-based social networking app, Clubhouse, and the state of vulnerability disclosure programs and bug bounties. </p>]]></description>
    <content:encoded><![CDATA[<p>Luta Security founder, security entrepreneur, and vulnerability disclosure pioneer Katie Moussouris joins the Aperture Podcast to talk about influential researcher Dan Kaminsky, who died April 23 at 42 years old. Katie discusses the breadth of Dan&apos;s work as a researcher, and his friendship, empathy, and outreach within the security community. <br/>Katie also talks about her work advocating for pay, gender and employment equity, and how her mother persevered as a single mother earning significantly less than male counterparts. <br/>Katie also explains her return to her hacker roots uncovering two serious vulnerabilities in the audio-based social networking app, Clubhouse, and the state of vulnerability disclosure programs and bug bounties. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8424012-katie-moussouris-on-dan-kaminsky-pay-equity-vulnerability-disclosure-progress.mp3" length="30136257" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8424012</guid>
    <pubDate>Thu, 29 Apr 2021 00:00:00 -0400</pubDate>
    <podcast:soundbite startTime="2157.0" duration="39.0" />
    <itunes:duration>2510</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kaspersky, Claroty on OPC Security Research</itunes:title>
    <title>Kaspersky, Claroty on OPC Security Research</title>
    <itunes:summary><![CDATA[On this episode of Claroty's Aperture Podcast, researchers from Claroty and Kaspersky  join to discuss security research into the OPC protocol.  OPC is a protocol stack that is used for interoperability between disparate vendor communication protocols in the ICS domain.   Kaspersky's Evgeny Goncharov and Claroty's Sharon Brizinov and Uri Katz bring their respective experience researching OPC and discuss why it's a critical protocol for OT networks. In 2018, Kaspersky Lab publis...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of Claroty&apos;s Aperture Podcast, researchers from Claroty and Kaspersky  join to discuss security research into the OPC protocol.  OPC is a protocol stack that is used for interoperability between disparate vendor communication protocols in the ICS domain. <br/><br/>Kaspersky&apos;s Evgeny Goncharov and Claroty&apos;s Sharon Brizinov and Uri Katz bring their respective experience researching OPC and discuss why it&apos;s a critical protocol for OT networks. In 2018, Kaspersky Lab published some of the earliest research into OPC security and disclosed 17 new vulnerabilities in the stack. This year, Claroty followed with its own research and nine vulnerabilities found in three vendor implementations of OPC. <br/><br/>The researchers discuss the current state of OPC security, how it can improve, and what vendors should be doing to ensure they&apos;re securely implementing OPC. </p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of Claroty&apos;s Aperture Podcast, researchers from Claroty and Kaspersky  join to discuss security research into the OPC protocol.  OPC is a protocol stack that is used for interoperability between disparate vendor communication protocols in the ICS domain. <br/><br/>Kaspersky&apos;s Evgeny Goncharov and Claroty&apos;s Sharon Brizinov and Uri Katz bring their respective experience researching OPC and discuss why it&apos;s a critical protocol for OT networks. In 2018, Kaspersky Lab published some of the earliest research into OPC security and disclosed 17 new vulnerabilities in the stack. This year, Claroty followed with its own research and nine vulnerabilities found in three vendor implementations of OPC. <br/><br/>The researchers discuss the current state of OPC security, how it can improve, and what vendors should be doing to ensure they&apos;re securely implementing OPC. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8240008-kaspersky-claroty-on-opc-security-research.mp3" length="31695068" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8240008</guid>
    <pubDate>Tue, 30 Mar 2021 15:00:00 -0400</pubDate>
    <itunes:duration>2639</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Josh Grunzweig on Exchange Zero Days</itunes:title>
    <title>Josh Grunzweig on Exchange Zero Days</title>
    <itunes:summary><![CDATA[Josh Grunzweig of Volexity joins the Aperture Podcast to discuss the Microsoft Exchange zero-day vulnerabilities and exploits that have been dominating headlines. Tens of thousands of organizations have already been compromised by attack groups using this bug to dump corporate email, and carry out further attacks such as ransomware or deploying cryptocurrency mining software.  Josh's team at Volexity was the first to report in-the-wild exploits of the Exchange zero days, and in this epis...]]></itunes:summary>
    <description><![CDATA[<p>Josh Grunzweig of Volexity joins the Aperture Podcast to discuss the Microsoft Exchange zero-day vulnerabilities and exploits that have been dominating headlines. Tens of thousands of organizations have already been compromised by attack groups using this bug to dump corporate email, and carry out further attacks such as ransomware or deploying cryptocurrency mining software. <br/>Josh&apos;s team at Volexity was the first to report in-the-wild exploits of the Exchange zero days, and in this episode, he describes the initial discovery of these attacks, and the short- and long-term implications for enterprises worldwide.</p>]]></description>
    <content:encoded><![CDATA[<p>Josh Grunzweig of Volexity joins the Aperture Podcast to discuss the Microsoft Exchange zero-day vulnerabilities and exploits that have been dominating headlines. Tens of thousands of organizations have already been compromised by attack groups using this bug to dump corporate email, and carry out further attacks such as ransomware or deploying cryptocurrency mining software. <br/>Josh&apos;s team at Volexity was the first to report in-the-wild exploits of the Exchange zero days, and in this episode, he describes the initial discovery of these attacks, and the short- and long-term implications for enterprises worldwide.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8159946-josh-grunzweig-on-exchange-zero-days.mp3" length="24910950" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8159946</guid>
    <pubDate>Wed, 17 Mar 2021 18:00:00 -0400</pubDate>
    <itunes:duration>2074</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mauro Conti on Assessing the Use of Insecure ICS Protocols</itunes:title>
    <title>Mauro Conti on Assessing the Use of Insecure ICS Protocols</title>
    <itunes:summary><![CDATA[Prof. Mauro Conti of the University of Padua, Italy joins the Aperture Podcast to discuss a paper he coauthored last year called Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.   The paper, co-written with Giovanni Barbieri, Nils Ole Tippenhauer, and Federico Turrin of the University of Padua and the Helmholtz Center for Information Security, examines the gaps and exposures presented by connecting industrial control systems to external networks.   Many of these n...]]></itunes:summary>
    <description><![CDATA[<p>Prof. Mauro Conti of the University of Padua, Italy joins the Aperture Podcast to discuss a paper he coauthored last year called <a href='https://arxiv.org/abs/2007.01114'>Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.</a><br/><br/> The paper, co-written with Giovanni Barbieri, Nils Ole Tippenhauer, and Federico Turrin of the University of Padua and the Helmholtz Center for Information Security, examines the gaps and exposures presented by connecting industrial control systems to external networks.<br/> <br/>Many of these networks and devices are communicating over insecure protocols that are insecure by design, lacking encryption or authentication, or are misconfigured.<br/> <br/>Internet-scanning services such as Shodan are also blind to much industrial traffic, the paper concludes, giving operators an incomplete picture of their exposure. Attackers, meanwhile, can leverage this to intercept and manipulate industrial traffic. <b><br/><br/></b><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Prof. Mauro Conti of the University of Padua, Italy joins the Aperture Podcast to discuss a paper he coauthored last year called <a href='https://arxiv.org/abs/2007.01114'>Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.</a><br/><br/> The paper, co-written with Giovanni Barbieri, Nils Ole Tippenhauer, and Federico Turrin of the University of Padua and the Helmholtz Center for Information Security, examines the gaps and exposures presented by connecting industrial control systems to external networks.<br/> <br/>Many of these networks and devices are communicating over insecure protocols that are insecure by design, lacking encryption or authentication, or are misconfigured.<br/> <br/>Internet-scanning services such as Shodan are also blind to much industrial traffic, the paper concludes, giving operators an incomplete picture of their exposure. Attackers, meanwhile, can leverage this to intercept and manipulate industrial traffic. <b><br/><br/></b><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8111234-mauro-conti-on-assessing-the-use-of-insecure-ics-protocols.mp3" length="22728933" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8111234</guid>
    <pubDate>Wed, 10 Mar 2021 01:00:00 -0500</pubDate>
    <itunes:duration>1892</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Water ISAC on Oldsmar Hack, Sector Cybersecurity</itunes:title>
    <title>Water ISAC on Oldsmar Hack, Sector Cybersecurity</title>
    <itunes:summary><![CDATA[Jennifer Lyn Walker and Michael Arceneaux of the Water ISAC join the podcast to discuss the recent cybersecurity incident at the Oldsmar, Fla., water-treatment facility, the state of cybersecurity inside the water &amp; wastewater critical infrastructure sector, and whether organizations are reticent about sharing information about attacks with others in the sector.  Walker is a cyber threat analyst with the Water ISAC, while Arceneaux is managing director of the organization. Water ISAC...]]></itunes:summary>
    <description><![CDATA[<p>Jennifer Lyn Walker and Michael Arceneaux of the Water ISAC join the podcast to discuss the recent cybersecurity incident at the Oldsmar, Fla., water-treatment facility, the state of cybersecurity inside the water &amp; wastewater critical infrastructure sector, and whether organizations are reticent about sharing information about attacks with others in the sector. <br/>Walker is a cyber threat analyst with the Water ISAC, while Arceneaux is managing director of the organization. Water ISAC has more than 400 member utilities serving much of the United States. <br/><br/><br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Jennifer Lyn Walker and Michael Arceneaux of the Water ISAC join the podcast to discuss the recent cybersecurity incident at the Oldsmar, Fla., water-treatment facility, the state of cybersecurity inside the water &amp; wastewater critical infrastructure sector, and whether organizations are reticent about sharing information about attacks with others in the sector. <br/>Walker is a cyber threat analyst with the Water ISAC, while Arceneaux is managing director of the organization. Water ISAC has more than 400 member utilities serving much of the United States. <br/><br/><br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/8008513-water-isac-on-oldsmar-hack-sector-cybersecurity.mp3" length="29568189" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8008513</guid>
    <pubDate>Mon, 22 Feb 2021 18:00:00 -0500</pubDate>
    <itunes:duration>2462</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Justin Searle on Pen-Testing ICS </itunes:title>
    <title>Justin Searle on Pen-Testing ICS </title>
    <itunes:summary><![CDATA[Justin Searle, director of ICS security at InGuardians and a SANS Institute ICS security senior instructor, joins the Aperture podcast to discuss penetration testing ICS environments.  Justin is a leader in the ICS security community, a 21-year veteran immersed in conducting and teach security assessments worldwide.  In this episode, Justin discusses the challenges in pen-testing production industrial environments, the state of pen-testing tooling for ICS, how digital transformation...]]></itunes:summary>
    <description><![CDATA[<p>Justin Searle, director of ICS security at InGuardians and a SANS Institute ICS security senior instructor, joins the Aperture podcast to discuss penetration testing ICS environments.  Justin is a leader in the ICS security community, a 21-year veteran immersed in conducting and teach security assessments worldwide.  In this episode, Justin discusses the challenges in pen-testing production industrial environments, the state of pen-testing tooling for ICS, how digital transformation and IT/OT convergence are changing the way cybersecurity is managed inside enterprises, and also industrial cybersecurity threats facing companies. <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Justin Searle, director of ICS security at InGuardians and a SANS Institute ICS security senior instructor, joins the Aperture podcast to discuss penetration testing ICS environments.  Justin is a leader in the ICS security community, a 21-year veteran immersed in conducting and teach security assessments worldwide.  In this episode, Justin discusses the challenges in pen-testing production industrial environments, the state of pen-testing tooling for ICS, how digital transformation and IT/OT convergence are changing the way cybersecurity is managed inside enterprises, and also industrial cybersecurity threats facing companies. <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/7399645-justin-searle-on-pen-testing-ics.mp3" length="28134002" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7399645</guid>
    <pubDate>Wed, 20 Jan 2021 19:00:00 -0500</pubDate>
    <itunes:duration>2343</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tom Tervoort on Zerologon</itunes:title>
    <title>Tom Tervoort on Zerologon</title>
    <itunes:summary><![CDATA[Tom Tervoort, a senior security specialist with Netherlands-based Secura, joins the Aperture Podcast to discuss the Zerologon vulnerability in Windows Netlogon. This critical crypto bug in the Netlogon authentication mechanism was discovered by Tom and the Secura team, and patched in August by Microsoft.  Since then, exploit code has surfaced and the vulnerability has been used by two separate APT groups. Tom discusses how he "accidentally" discovered Zerologon, the risks posed by succes...]]></itunes:summary>
    <description><![CDATA[<p>Tom Tervoort, a senior security specialist with Netherlands-based Secura, joins the Aperture Podcast to discuss the <a href='https://www.secura.com/uploads/whitepapers/Zerologon.pdf'>Zerologon vulnerability in Windows Netlogon</a>. This critical crypto bug in the Netlogon authentication mechanism was discovered by Tom and the Secura team, and patched in August by Microsoft. <br/>Since then, exploit code has surfaced and the vulnerability has been used by two separate APT groups. Tom discusses how he &quot;accidentally&quot; discovered Zerologon, the risks posed by successful exploits, how and why APTs might use it, and the resources required to use it in attacks against Active Directory, domain controllers, and other Windows authentication mechanisms. </p>]]></description>
    <content:encoded><![CDATA[<p>Tom Tervoort, a senior security specialist with Netherlands-based Secura, joins the Aperture Podcast to discuss the <a href='https://www.secura.com/uploads/whitepapers/Zerologon.pdf'>Zerologon vulnerability in Windows Netlogon</a>. This critical crypto bug in the Netlogon authentication mechanism was discovered by Tom and the Secura team, and patched in August by Microsoft. <br/>Since then, exploit code has surfaced and the vulnerability has been used by two separate APT groups. Tom discusses how he &quot;accidentally&quot; discovered Zerologon, the risks posed by successful exploits, how and why APTs might use it, and the resources required to use it in attacks against Active Directory, domain controllers, and other Windows authentication mechanisms. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/6896774-tom-tervoort-on-zerologon.mp3" length="29699173" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6896774</guid>
    <pubDate>Thu, 17 Dec 2020 18:00:00 -0500</pubDate>
    <itunes:duration>2473</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS</itunes:title>
    <title>Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS</title>
    <itunes:summary><![CDATA[Richard Thomas of the University of Birmingham and Joseph Gardiner of the Bristol Cyber Security Group, University of Bristol, discuss their recently published paper: "Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures." The paper examines how long ICS and OT vulnerabilities are in the wild before being discovered, and also shortcomings in ICS-related CVEs, which are often the first touch organizations have with vuln...]]></itunes:summary>
    <description><![CDATA[<p>Richard Thomas of the University of Birmingham and Joseph Gardiner of the Bristol Cyber Security Group, University of Bristol, discuss their recently published paper: &quot;<a href='https://dl.acm.org/doi/pdf/10.1145/3411498.3419970'>Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures</a>.&quot; The paper examines how long ICS and OT vulnerabilities are in the wild before being discovered, and also shortcomings in ICS-related CVEs, which are often the first touch organizations have with vulnerabilities on their networks.  Learn how long vulnerabilities are present before they&apos;re uncovered, and exactly what the gap is between CVE information and the details about affected products. The researchers also share recommendations for suggested improvements. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Richard Thomas of the University of Birmingham and Joseph Gardiner of the Bristol Cyber Security Group, University of Bristol, discuss their recently published paper: &quot;<a href='https://dl.acm.org/doi/pdf/10.1145/3411498.3419970'>Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures</a>.&quot; The paper examines how long ICS and OT vulnerabilities are in the wild before being discovered, and also shortcomings in ICS-related CVEs, which are often the first touch organizations have with vulnerabilities on their networks.  Learn how long vulnerabilities are present before they&apos;re uncovered, and exactly what the gap is between CVE information and the details about affected products. The researchers also share recommendations for suggested improvements. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/6514048-richard-thomas-joe-gardiner-on-cve-discovery-time-for-ics.mp3" length="29567498" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6514048</guid>
    <pubDate>Tue, 24 Nov 2020 00:00:00 -0500</pubDate>
    <itunes:duration>2462</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI</itunes:title>
    <title>Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI</title>
    <itunes:summary><![CDATA[Dustin Childs, Communications Manager for the Zero Day Initiative (ZDI) joins the Aperture podcast to talk about vulnerability disclosure and its evolution since the early 2000s. Dustin also covers the legacy of ZDI as a vulnerability clearinghouse as it turns 15 this year, some milestones for bug-hunters, and the role of Pwn2Own in maturing disclosures for vendors and researchers alike. The conversation also includes the growing interest in uncovering vulnerabilities in industrial control sy...]]></itunes:summary>
    <description><![CDATA[<p>Dustin Childs, Communications Manager for the Zero Day Initiative (ZDI) joins the Aperture podcast to talk about vulnerability disclosure and its evolution since the early 2000s. Dustin also covers the legacy of ZDI as a vulnerability clearinghouse as it turns 15 this year, some milestones for bug-hunters, and the role of Pwn2Own in maturing disclosures for vendors and researchers alike. The conversation also includes the growing interest in uncovering vulnerabilities in industrial control systems and the very different patching dynamic for operational technology. </p>]]></description>
    <content:encoded><![CDATA[<p>Dustin Childs, Communications Manager for the Zero Day Initiative (ZDI) joins the Aperture podcast to talk about vulnerability disclosure and its evolution since the early 2000s. Dustin also covers the legacy of ZDI as a vulnerability clearinghouse as it turns 15 this year, some milestones for bug-hunters, and the role of Pwn2Own in maturing disclosures for vendors and researchers alike. The conversation also includes the growing interest in uncovering vulnerabilities in industrial control systems and the very different patching dynamic for operational technology. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/6425650-dustin-childs-on-vulnerability-disclosure-pwn2own-zdi.mp3" length="26304359" type="audio/mpeg" />
    <itunes:author>Claroty</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6425650</guid>
    <pubDate>Wed, 18 Nov 2020 00:00:00 -0500</pubDate>
    <itunes:duration>2190</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Introducing Aperture, A Claroty Podcast</itunes:title>
    <title>Introducing Aperture, A Claroty Podcast</title>
    <itunes:summary><![CDATA[Welcome to Claroty's brand new podcast, Aperture! hosted by Editorial Director Mike Mimoso.  Aperture will feature regular discussions with IT and OT security experts as we focus on protecting the critical infrastructure that impacts so much of our day-to-day lives.  Please share the word about the podcast. It will be available on all the major platforms, and on the Claroty blog.  Subscribe now so you don't miss any of our discussions.  We'll be back soon with compelling discussions...]]></itunes:summary>
    <description><![CDATA[<p>Welcome to Claroty&apos;s brand new podcast, Aperture! hosted by Editorial Director Mike Mimoso. <br/>Aperture will feature regular discussions with IT and OT security experts as we focus on protecting the critical infrastructure that impacts so much of our day-to-day lives. <br/>Please share the word about the podcast. It will be available on all the major platforms, and on the <a href='https://www.claroty.com/blog/'>Claroty blog</a>. <br/>Subscribe now so you don&apos;t miss any of our discussions. <br/>We&apos;ll be back soon with compelling discussions with the best minds in IT and OT security. <br/>Thanks for listening. </p>]]></description>
    <content:encoded><![CDATA[<p>Welcome to Claroty&apos;s brand new podcast, Aperture! hosted by Editorial Director Mike Mimoso. <br/>Aperture will feature regular discussions with IT and OT security experts as we focus on protecting the critical infrastructure that impacts so much of our day-to-day lives. <br/>Please share the word about the podcast. It will be available on all the major platforms, and on the <a href='https://www.claroty.com/blog/'>Claroty blog</a>. <br/>Subscribe now so you don&apos;t miss any of our discussions. <br/>We&apos;ll be back soon with compelling discussions with the best minds in IT and OT security. <br/>Thanks for listening. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1475533/episodes/6398284-introducing-aperture-a-claroty-podcast.mp3" length="1138999" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/frndqcz5pp74z7j3dtklo1by33iu?.jpg" />
    <itunes:author>Michael</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6398284</guid>
    <pubDate>Mon, 16 Nov 2020 10:00:00 -0500</pubDate>
    <itunes:duration>93</itunes:duration>
    <itunes:keywords>OT security, ICS security, information security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
