Episodes

  • The Security Sandbox at the ICS Cybersecurity Conference
    Nov 1 2024

    Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as:

    ✅ Emerging threats to ICS over the next 12-18 months

    ✅ Evolving strategies for integrating IT and OT cybersecurity

    ✅ The future role of AI in ICS cybersecurity

    ✅ Fostering collaboration between IT and OT teams

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    20 mins
  • The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
    Sep 26 2024

    Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.

    In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments.

    You'll learn about:

    • Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surface
    • Using asset context when acting on threat intelligence in OT systems
    • Real-world examples of successful proactive threat response

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    33 mins
  • The Security Sandbox | Modernizing Cyber Risk Management in OT
    Aug 28 2024

    Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply the latest tools, trends and techniques to reduce cyber risk and enhance the resilience of your OT systems.

    We’ll cover:

    • Different risk scoring approaches, like quantitative, qualitative, and hybrid models, which help organizations prioritize and address vulnerabilities.
    • Emerging trends in cyber risk management, including the growing adoption of AI-driven analytics, automation, and integrated security frameworks.
    • How technologies like artificial intelligence and advanced threat detection systems are reshaping how organizations mitigate risk in OT environments.

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    32 mins
  • The Security Sandbox | Evolving Endpoint Security in OT
    Jul 31 2024

    Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and even operational data from level 0 in a PLC.

    During this session, we'll delve into the advancements in OT-safe proactive monitoring and how you could apply some of these latest developments towards securing your critical infrastructure while ensuring operational continuity and compliance.

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    31 mins
  • The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
    Jul 9 2024

    Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is on to outsmart bad actors who are already using new forms of AI to find vulnerabilities faster and launch more effective attacks. During this session, we'll delve into what AI really is, its applications for cybersecurity, and how critical infrastructure and industrial organizations are using it to stay ahead of cyber threats.


    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    32 mins
  • What is Incident Response? | Nozomi Networks
    Dec 29 2022

    Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incident does occur.

    Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and OT Cybersecurity Strategist Danielle Jablanski.

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    43 mins
  • What is Threat Detection? | Nozomi Networks
    Dec 28 2022

    Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further.

    Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Security Research Evangelist Roya Gordon.

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    37 mins
  • What is Cyber Risk Management? | Nozomi Networks
    Dec 28 2022

    Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps.

    Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou.

    Visit Our Website

    Follow Us on LinkedIn

    Show More Show Less
    37 mins