Podchaser Logo
Home
IoT Security Podcast

Phosphorus Cybersecurity Inc

IoT Security Podcast

A Technology and Business podcast
Good podcast? Give it some love!
IoT Security Podcast

Phosphorus Cybersecurity Inc

IoT Security Podcast

Episodes
IoT Security Podcast

Phosphorus Cybersecurity Inc

IoT Security Podcast

A Technology and Business podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of IoT Security Podcast

Mark All
Search Episodes...
Explore the intricate challenges and solutions in managing OT cybersecurity, particularly emphasizing the importance of active querying over passive deep packet inspection, with Michael Lester, Senior Product Security Engineer at Rockwell Autom
In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and heal
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO Jason Taule, who brings a wealth of experience and insigh
Sean Tufts is in the house, and we ask him to go all the way back. All the way. From his origins to the evolving challenges and security needs in IoT and OT environments, particularly in critical infrastructure. Your hosts, Brian Contos and Joh
Content Warning: This episode contains explicit language and references to criminal activity.In this episode, Brian and John are joined by a very special guest—John Threat, also known as John Lee, a veteran of the Great Hacker War and known as
She's no slacker. Danielle Jablanski has been an "expert" — she hates that word — in nuclear policy analysis (the "original Cyber-Physical System"), energy research, and now Nozomi Networks, where she plays the crucial OT cybersecurity strategi
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security. Susan Peterson Sturm has dedicated most of her career t
Find the line between man and machine with John, Brian, and guest Len Noe, CyberArk technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to a number of augmentations himself, is a sel
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced stage coaches to the security today, there's a focus on the physical. In today
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His naturally (self-described) paranoid nature drove him to constantly think about p
Ron Kuriscak is here to share his extensive knowledge and experiences in the world of IoT security, and has he got some great stories! Ron brings over 20 years of experience in the field to the show. He's been in the trenches on a number of hig
Huddled in a corner, away from the lights and sounds of the slots, John and Brian reminisce about the Black Hat USA conferences gone by and what trends and topics this one already holds. In this mini-sode on location, the dynamic duo discusses
Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched the cybersecurity industry explode. She brings a unique perspective to the podcast in discussion with Brian and John as they pick apart the challenges f
It's cyber all day, every day, with Chase Cunningham, Dr. Zero Trust himself. He joins John and Brian to delve into the complex and ever-evolving world of online security threats. With cyber-attacks becoming increasingly sophisticated and preva
In this episode, Tammy Hawkins, a fraud specialist with over 20 years of experience, warns of the growing threat of cyberattacks on IoT devices and emphasizes the need for organizations and individuals to take proactive security measures. She o
Brian and John sit down to the mic with Vignesa Moorthy. With a seasoned background in telecommunications and cybersecurity, Vignesa Moorthy is a forward-thinking innovator in the industry. Running a successful Singapore-based telco company, he
Are you tired of feeling helpless and exposed when using IoT devices? Have you been told to simply 'be careful' without any real solutions? In this episode, we get our ears on some expert insights and practical solutions to help you take contro
In this episode, John and Brian talk with Mark Weatherford, a skilled cybersecurity veteran with a diverse background in both government and private sectors. Having held positions such as CISO for California and Colorado and serving in the Obam
In this episode, Brian and John dive into the world of Capture the Flag competitions in the realm of cybersecurity. Our special guest, Rachael Tubbs from IoT Village, discusses the rise of CTFs and how they are becoming a popular feature at cyb
In this episode, Brian and John speak with Julie Tsai. Julie Tsai is a seasoned cybersecurity expert with over 25 years of experience in Silicon Valley, navigating the complex world of securing IoT environments. With a diverse background that i
Unlock the secrets to secure your connected world with powerful IoT security solutions."If you don't assume that there's going to be some level of detect and respond kind of fail back mechanism, then you're going to come up and be very disappoi
When Steven Edwards, an IT Guy turned Security Analyst, discovered the unexpected challenge of securing an expansive attack surface that includes refrigerators, vending machines, and scanners across multiple private address spaces, he had to be
When tech industry veteran Dave Bang discovers that vendors have been using their phones to gain access to secure networks, he embarks on an urgent mission to secure the OT networks and prevent an attack before it's too late.In this episode, yo
In this episode, Brian and John speak with Eric Adams, a 25-year security veteran. Eric embarks on a journey to protect data from attackers, navigating the complex process of FedRAMP Authorization and cyber liability insurance to ensure secure
"Discover how to hold vendors accountable for their cybersecurity responsibility and protect your business from attack."In this episode, Brian and John are back, this time with Kathleen Moriarty discussing how to hold vendors accountable for th
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features