Unlocking Resilient Cybersecurity Solutions in Healthcare and Beyond with Jason Taule
IoT Security Podcast
by Phosphorus Cybersecurity
2M ago
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO Jason Taule, who brings a wealth of experience and insights from his diverse career in the field as one of the first CISOs...ever. From working with federal agencies like NASA to serving as a virtual CISO for agriculture, heavy manufacturing, and healthcare organizations, Jason offers valuable perspectives on the unique security challenges faced across different sectors. Throughout the episode, Jason discusse ..read more
Visit website
Securing Critical Infrastructure: Challenges and Strategies with Sean Tufts
IoT Security Podcast
by Phosphorus Cybersecurity
3M ago
Sean Tufts is in the house, and we ask him to go all the way back. All the way. From his origins to the evolving challenges and security needs in IoT and OT environments, particularly in critical infrastructure. Your hosts, Brian Contos and John Vecchi, engage in a thought-provoking conversation with special guest Sean Tufts from Optiv. The discussion goes into Tufts' background, from his transition from an NFL player to a cybersecurity and critical infrastructure expert, to managing substantial programs at Optiv. Sean touches on the changing landscape of critical infrastructure, the challenge ..read more
Visit website
The Evolution of Hacking: From Counterculture to Cybersecurity with John Threat
IoT Security Podcast
by Phosphorus Cybersecurity
3M ago
Content Warning: This episode contains explicit language and references to criminal activity. In this episode, Brian and John are joined by a very special guest—John Threat, also known as John Lee, a veteran of the Great Hacker War and known as "Corrupt" from the early 90s hacking group MOD (Masters of Deception). We dive into the fascinating origins and culture of hacking, with John Threat sharing his experiences from the '80s all the way to the present day and the excitement of exploring and breaking into systems. The discussion also explores the evolution and loss of excitement in the hacki ..read more
Visit website
The "Original Cyber-Physical System": Legacy Devices and Key Trends in OT Cybersecurity
IoT Security Podcast
by Phosphorus Cybersecurity
6M ago
She's no slacker. Danielle Jablanski has been an "expert" — she hates that word — in nuclear policy analysis (the "original Cyber-Physical System"), energy research, and now Nozomi Networks, where she plays the crucial OT cybersecurity strategist role.  John Vecchi and Brian Contos pick Danielle's brain on the ever- and never-changing trends and challenges, digging into the need for consequence-based security and collaboration between security professionals and OT engineers. The discussion also covers the growing concern about the security of IoT devices in OT environments, the importance ..read more
Visit website
User-Centric Security: Focusing on UX, Design, and Embedding Security in Daily Routine
IoT Security Podcast
by Phosphorus Cybersecurity
7M ago
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security. Susan Peterson Sturm has dedicated most of her career to the energy industry, where her expertise lies in asset optimization and energy market trading. However, it was her venture into product management that led her to the exciting field of OT security. Susan's journey in the industry spans approximately 15 years, and she feels privileged to have witnessed the growth and evolution of her peers throughout th ..read more
Visit website
Implants, Innovation, and the Human Condition: Embracing the Technological Evolution
IoT Security Podcast
by Phosphorus Cybersecurity
7M ago
Find the line between man and machine with John, Brian, and guest Len Noe, CyberArk technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to a number of augmentations himself, is a self-taught cybersecurity expert with a unique background in the world of black hat and gray hat hacking. For most of his life, Len delved into the dark side of technology, breaking into computers and causing havoc. However, with the arrival of grandchildren, Len realized that he needed to change his ways. Recognizing that his skills were primarily focused ..read more
Visit website
The Human Component: Vulnerabilities and Leadership with Patrick Benoit of Brinks
IoT Security Podcast
by Phosphorus Cybersecurity
8M ago
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced stage coaches to the security today, there's a focus on the physical.  In today's episode, John and Brian talk to Patrick Benoit about people and Things. People are the solution as well as the problem, as Patrick declares that breaches only happen for two reasons. Someone did something they were supposed to do, or someone didn’t do something they were supposed to do. There’s always a human component.  Listen in as they h ..read more
Visit website
Hiding Inside Devices: Unveiling Vulnerabilities in Finance, Retail, and Logistics
IoT Security Podcast
by Phosphorus Cybersecurity
8M ago
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His naturally (self-described) paranoid nature drove him to constantly think about potential vulnerabilities and how to protect against them. Andres was already performing tests on his software creations, and his career transitioned from software engineering to becoming a renowned figure in the world of security. Andres sheds light on a significant portion of the attack surface, including IoT, OT, IIoT, and IoMT cyber-physical systems i ..read more
Visit website
Lessons from the Frontlines: Ron Kuriscak's Experiences with IoT Security Breaches
IoT Security Podcast
by Phosphorus Cybersecurity
9M ago
Ron Kuriscak is here to share his extensive knowledge and experiences in the world of IoT security, and has he got some great stories! Ron brings over 20 years of experience in the field to the show. He's been in the trenches on a number of high-profile breaches, giving him a unique perspective on the challenges and importance of securing IoT devices. In our conversation, we dive deep on the role of the CISO, their relationships with other executives, and the evolving threat landscape, littered with unmonitored, unmanaged devices. Ron sheds light on the struggles faced by CISOs, as they juggle ..read more
Visit website
Live from Las Vegas: the Black Hat experience
IoT Security Podcast
by Phosphorus Cybersecurity
9M ago
Huddled in a corner, away from the lights and sounds of the slots, John and Brian reminisce about the Black Hat USA conferences gone by and what trends and topics this one already holds.  In this mini-sode on location, the dynamic duo discusses AI, xIoT, and the security of slots. But when you end up in Vegas yearly, you also inevitably get up to some non-work activities. Did you know you can rent and drive construction equipment? Let's get into Things on an extra mini-sode of the IoT Security Podcast! Let’s get into Things on the IoT Security Podcast! Follow Brian Contos on LinkedIn at ..read more
Visit website

Follow IoT Security Podcast on FeedSpot

Continue with Google
Continue with Apple
OR