podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Claroty
Shows
Tech Talks Daily
Claroty on Combating Model Poisoning and Adversarial Prompts
AI is rapidly becoming part of the healthcare system, powering everything from diagnostic tools and medical devices to patient monitoring and hospital operations. But while the potential is extraordinary, the risks are equally stark. Many hospitals are adopting AI without the safeguards needed to protect patient safety, leaving critical systems exposed to threats that most in the sector have never faced before. In this episode of Tech Talks Daily, I speak with Ty Greenhalgh, Healthcare Industry Principal at Claroty, about why healthcare’s AI rush could come at a dangerous cost if security does not keep pace. Ty...
2025-08-26
35 min
Nexus: A Claroty Podcast
Noam Moshe on Hacking Video Surveillance
Noam Moshe, Research Director for Claroty Team82, joins the Nexus Podcast live at the Black Hat Briefings in Las Vegas to discuss research that was presented here on the security of a popular video surveillance platform manufactured by Axis Communications. Moshe describes how Team82 examined the proprietary protocol supporting Axis servers and clients (camera) and uncovered four vulnerabilities that could be chained to eventually gain pre-authentication remote-code execution. Moshe explains Team82's research process, the risks to users, and the successful disclosure process with Axis Communication that resulted in prompt patches available for the servers an...
2025-08-07
27 min
OT Security Hub
OT Asset Discovery met Claroty - Erwin Schürmann
#15: Diep Inzicht in OT Asset Discovery met ClarotyIn deze aflevering van de OT Security Hub Podcast duiken Joep van Heumen en Christiaan Glaser samen met Erwin Schürmann (Solution Engineer bij Claroty) in de wereld van asset discovery binnen operational technology (OT).Wat gebeurt er wanneer organisaties zelf geen idee hebben welke apparaten en systemen ze in hun OT-netwerk hebben draaien? Claroty biedt daar een oplossing voor met geavanceerde methodes voor asset inventory, passieve én actieve detectie, en netwerkvisualisatie – zónder de productie te verstoren.🎧 Wat je leert in deze afl...
2025-07-08
29 min
Nexus: A Claroty Podcast
Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents
Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa.
2025-02-17
33 min
Nexus: A Claroty Podcast
CISA's Matthew Rogers on Secure by Demand for OT
Matthew Rogers, ICS Cybersecurity Strategy & R&D Lead at the Cybersecurity & Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.” This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. Read Claroty's blog on the guide.Listen to every episode of the Nexus Podcast here.
2025-01-19
39 min
ICS Cyber Talks Podcast
Sharon Brizinov Director of Research @Claroty (Team82) finding OT variabilities before the attacker
קבוצה82 היא אחת מקבוצות מחקר הסייבר המוערכות בעולם, המחקרים שלהם משפיעים על יצרנים ועולם הסייבר למערכות תפעוליות בכלל ולא רק. נחשון פינקו מארח את שרון בריזינוב דירקטור מחקר בחברת קלארוטי וראש קבוצת82 בשיחה על סייבר בעולמות התפעולים, איומים, תוקפים וכול מה שביניהם. מה ההבדל בין מחקר סייבר בעולמות הדאטה וסביבות תפעוליות כיצד מגיבים יצרנים למחקרים ועוד הבלוג של קבוצת82 : http://claroty.com/team82 Team82 is one of the most prestigious research teams. Its research has dramatically influenced OT vendors and the OT cyber industry. Nachshon Pincu hosts Sharon Brizinov, Director of Research at Claroty and head of Team82, to discuss operational technology (OT) cybersecurity research, threats, attacks, and related topics. The conversation explores key questions such as: What distinguishes IT from OT cybersecurity research? How do vendors respond to researchers' findings? And more. Team82 blog: http://claroty.com/team82
2024-12-25
49 min
Nexus: A Claroty Podcast
Noam Moshe on the IOCONTROL Malware
Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices. Read Team82's research blog: "Inside a New OT/IoT Cyberweapon: IONCONTROL"Listen and subscribe to the Nexus Podcast here.
2024-12-19
23 min
Nexus: A Claroty Podcast
Team82 on Attacking the Insecure IoT Cloud
Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.You can find the research here on Team82's website. Listen and subscribe to the Nexus Podcast...
2024-12-13
31 min
Nexus: A Claroty Podcast
Volexity's Steven Adair on the Nearest Neighbor Attack
Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia's APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022. APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain of breaches and compromises—until they were able to reach their target. Volexity's blog contains additional technical details. ...
2024-12-09
37 min
Nexus: A Claroty Podcast
Grant Geyer on the Business Impact of Disruptions from Cyberattacks
Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. The financial losses are steep from these attacks impacting connected systems that are so central to our way of life, as are the recovery costs and operational impacts such as downtime, which is often intolerable in critical industries such as manufacturing and healthcare.Geyer brings his unique insights to the discussions, including attackers' motivations in targeting CPS, why ransomware continues to impact...
2024-10-28
25 min
Industrial Cybersecurity Insider
AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty
In this week's episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.Chapters:00:00:00 - Pandemic's Impact on Critical Infrastructure00:01:08 - Introduction to...
2024-10-22
29 min
Nexus: A Claroty Podcast
Alethe Denis on Social Engineering, Red-Teaming
Bishop Fox senior security consultant Alethe Denis joins the Claroty Nexus podcast to discuss social engineering in cybersecurity and how it has become part of red-team engagements, especially inside critical infrastructure organizations. She explains the value of open source intelligence and data stolen in breaches to scammers and extortionists in creating pretexts for their schemes. She also explains how to best defend against these tactics that aid threat actors in weaponizing personal information against victims and organizations. For more, visit nexusconnect.io/podcasts.
2024-08-26
43 min
Nexus: A Claroty Podcast
Alon Dankner on Extracting Crypto Keys from PLCs
Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir's presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system.For more, visit nexusconnect.io/podcasts
2024-08-19
27 min
Nexus: A Claroty Podcast
Noam Moshe on Extracting Forensic Data from Unitronics PLCs
Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to talk about Team82’s research into Unitronics Vision series integrated HMI/PLC devices. The OT devices were exploited last year in attacks against water treatment facilities in the U.S. and Israel. Team82 researched the security of these devices and developed a pair of tools that allowed them to extract forensic information from the PLCs. Both tools were released to open source on Team82’s Github page.Moshe also presented this research today at the Black Hat Briefings in Las Vegas. Read Team82’s research blog here.
2024-08-08
27 min
Nexus: A Claroty Podcast
Ahmik Hindman on Patching OT and ICS
Ahmik Hindman, Senior Network and Security Solution Consultant at Rockwell Automation, joins the Claroty Nexus podcast to discuss the challenges and success stories he's experienced in patching operational technology equipment and industrial control systems. Hindman has been at Rockwell Automation for 28 years and has expansive experience with customers solving these complex cybersecurity issues. Hindman shares some of the frameworks, tools, and approaches he's worked with, and how convergence and other recent trends have changed how organizations handle vulnerabilities. For more, visit nexusconnect.io/podcasts
2024-07-08
28 min
Nexus: A Claroty Podcast
Diana Kelley on Protecting the AI Lifecycle
Protect AI Chief Information Security Officer Diana Kelley joins the Claroty Nexus podcast to discuss the intricacies of securing machine learning and artificial intelligence use inside the enterprise. She also explains the concept of MLSecOps and how it compares and contrasts to DevOps used in application development. For more, visit nexusconnect.io/podcasts
2024-06-03
26 min
Nexus: A Claroty Podcast
Jennifer Minella on OT Cybersecurity Convergence
Jennifer Minella, founder and principal advisor of Viszen Security, joins the Claroty Nexus podcast to discuss her experiences advising organizations on operational technology implementations, risk management, and succeeding at IT/OT convergence. This episode was recorded during RSA Conference where Jennifer and Bryson Bort gave a talk on convergence from the perspectives of a defender of industrial networks, and from the viewpoint of an offensive security specialist. For more, visit nexusconnect.io/podcasts
2024-05-28
29 min
Nexus: A Claroty Podcast
Charles Blauner on the Changing Role of the CISO
Charles Blauner, Team8 operating partner and CISO in residence, joins the Claroty Nexus podcast to discuss the rapid changes in responsibilities and liability risks facing today's chief information security officers. Blauner, former CISO at JP Morgan and Deutsche Bank, describes how, for example, the new SEC rules around disclosures and incidents, along with legal action against high-profile CISOs of public companies, have some security leaders re-thinking how they operate and negotiate within their roles. He also discusses whether enterprises should brace for an exodus of those in the CISO chair today. For more, visit nexusconnect.i...
2024-05-20
31 min
Nexus: A Claroty Podcast
Mikko Hypponen on a Decade of Corporate Ransomware Attacks
Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today's enormously profitable ransomware services and gangs . For more, visit nexusconnect.io/podcasts
2024-05-13
32 min
Nexus: A Claroty Podcast
Adm. Michael Rogers on Geopolitics and Cybersecurity
Former NSA Director Adm. Michael S. Rogers (Ret. USN) joins the Claroty Nexus Podcast live from RSA Conference in San Francisco to discuss the current geopolitical climate, its impact on chief information security officers, and how they can and should response. Rogers discusses how the doctrines of adversaries are changing and that U.S. critical infrastructure is increasingly in the crosshairs. He also brings his experience and delivers practical advice for CISOs who are not only dealing with external adversaries but also potential legal liability in the event of breaches.For more, visit nexusconnect.io...
2024-05-09
27 min
Nexus: A Claroty Podcast
Abel Archundia on Complexity in Critical Infrastructure
Abel Archundia, chief technology officer and global head of advisory for Istari, joins the Claroty Nexus podcast to discuss the nature of complexity, technical debt, and regulation, and how it influences risk decisions in critical infrastructure environments. He explains the challenges complexity brings to manufacturing, pharmaceuticals, and other CI sectors, and how owners and operators may feel outmatched by technical debt. For more, visit nexusconnect.io/podcasts
2024-04-29
35 min
Nexus: A Claroty Podcast
Adam Gluck on Industrial DevOps
Adam Gluck, founder and CEO of Copia Automation, joins the Claroty Nexus podcast to discuss the need for DevOps within industrial automation. DevOps practices are popping up more frequently in these environments, but there are still hurdles and challenges for developers and engineers to overcome. Adam covers those, and explains how DevOps can improve disaster recovery, lessen the introduction of vulnerabilities in new code, and mitigate risk by being proactive about reviewing code changes as they happen rather than later in the development lifecycle. For more, visit nexusconnect.io/podcasts
2024-04-24
37 min
Nexus: A Claroty Podcast
Greg Garcia on the Change Healthcare Cyberattack
Greg Garcia, the executive director of the Healthcare and Public Health Sector Coordinating Council’s Cybersecurity Working Group, joins the Claroty Nexus podcast to discuss the Change Healthcare ransomware attack and what can be done from a policy perspective to minimize the impact of such attacks in the future.Garcia has had a long career on the policy side of cybersecurity, and was the first presidentially appointed Assistant Secretary for Cybersecurity at the Department of Homeland Security. In this episode, he discusses where organizations are in terms of recovery from the impacts of the attack, longterm impacts on...
2024-04-02
44 min
Nexus: A Claroty Podcast
Ryan Pickren on New Web-Based PLC Malware Research
Ryan Pickren, a Ph.D. student in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, joins the Claroty Nexus podcast to discuss a recently published research paper that explains a new web-based malware attack against programmable logic controllers. Pickren, the lead author, along with colleagues Tohid Shekari, Saman Zonouz, and Raheem Beyah, explains how embedded webservers inside modern PLCs can be attacked to give remote attackers full control over the device. Check out their paper: “Compromising Industrial Processes Using Web-Based Programmable Logic Controller Malware”For more, visit nexusconnect.io/p...
2024-03-06
35 min
Nexus: A Claroty Podcast
Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents
Hormel Foods Chief Information Security Officer and Director of Information Security and Compliance Mike Rogers joins the Claroty Nexus podcast to discuss why it's so important for CISO's to understand their personal liability during cybersecurity incidents. New regulations, including the SEC's cybersecurity rules, are driving this need for security leadership to evaluate to manage their personal exposure. Rogers provides his perspective on the SEC rules, how incident response is changing, and the ambiguity around exactly what constitutes a "material" incident.For more, visit nexusconnect.io/podcasts
2024-02-14
37 min
Nexus: A Claroty Podcast
Team82 Answers More of your OT Cybersecurity Questions
Noam Moshe of Claroty Team82 is back to answer more listener questions about OT vulnerability research, threats and risks to OT networks and IoT devices, and the best mitigation and remediation strategies for defenders. This is a follow-up podcast to an episode we recorded in December answering listener questions. You can listen to that episode here.For more, visit nexusconnect.io/podcasts
2024-01-25
31 min
Industrial Cybersecurity Insider
Future Trends & Evolving Cybersecurity Threats with Simon Chassar, Claroty Former CRO
Today we welcome Simon Chassar, former CRO of Claroty, to the show. Simon and Craig Duckworth explore the ever-evolving cyber threats facing the industrial sector, underscoring the critical need for robust operational technology (OT) security. Simon highlights the unique challenges posed by legacy systems, their adaptation to modern security standards, and the necessity of industry-specific cybersecurity measures. The conversation shifts to the role of regulation in driving security initiatives and the dire need for skilled professionals in this specialized field. They discuss the complexities of securing industrial control systems and emphasize the imperative of protecting society's critical...
2024-01-23
28 min
Nexus: A Claroty Podcast
Juan Piacquadio on Securing Pharma 4.0
Phlow Corp., CIO Juan Piacquadio joins the Claroty Nexus podcast to discuss the application of Industry 4.0 to pharmaceuticals, also known as Pharma 4.0. The industry is quickly adopting advanced technologies such as artificial intelligence, digital twins, and augmented reality to enhance the development of medicine and improve patient care. Along with that expansion of capabilities comes a wider attack surface, and Piacquadio spends a good deal of time explaining not only the threat landscape he envisions, but also how giant pharmaceuticals, the supply chain, and security providers must respond. For more, visit nexusconnect.io/podcasts
2024-01-10
47 min
Nexus: A Claroty Podcast
David Elfering on CISOs and Cyber Liability Insurance
David Elfering, CISO at Carrix and former security and risk executive at Marsh, is back for another episode of the Claroty Nexus podcast to discuss cyber liability insurance. Elfering has extensive experience working not only as an enterprise cybersecurity executive, but also with one of the world's leading insurance carriers. Listen as he brings insight on that perspective, how carrier cybersecurity requirements align with risk reduction, red flags that can imperil coverage or claims, and how cyber insurance providers are looking at geopolitical conflict. For more, visit nexusconnect.io/podcasts
2024-01-04
44 min
Nexus: A Claroty Podcast
Team82 Answers Your Vulnerability Research Questions
Team82 researchers Sharon Brizinov and Noam Moshe join the Claroty podcast for a special episode where they answer questions submitted by users. This Ask-Me-Anything style of podcast covers the team's OT and IoT vulnerability research process, resources for experienced and beginner vulnerability researchers, and insights from their point of view on the threat landscape for cyber-physical systems.
2023-12-06
28 min
Nexus: A Claroty Podcast
Mandiant on Sandworm APT Attacks in Ukraine
Nathan Brubaker, Mandiant and Google Cloud Head of Emerging Threats and Analytics, joins the Claroty Nexus podcast for a timely discussion on his team’s report published this week on the Sandworm APT’s activity in Ukraine. Sandworm leveraged a new TTP—Living off the Land techniques—to target a Ukrainian energy company in October 2022 to cause a power outage. That outage also coincided with missile attacks by Russia against critical infrastructure in Ukraine. Read Mandiant's Sandworm paper here.
2023-11-10
30 min
Nexus: A Claroty Podcast
Don Weber on Security Culture in Control Environments, STAR Methodology
Don Weber of Cutaway Security joins the Nexus podcast to discuss a trend in control environments where asset operators and engineers keep trained cybersecurity professionals at arm's length, citing safety concerns. As more control systems are connected and managed online, it's critical for certified security professionals to be included in overall safety and reliability activities. Otherwise new risk and vulnerabilities are likely to be introduced. Weber also discusses a new methodology for assessing implementation vulnerabilities within industrial automation and control systems. Read more about IACS STAR: IACS STAR CalculatorIACS STAR GitHub
2023-10-26
44 min
Nexus: A Claroty Podcast
MITRE on Caldera for OT
Misha Belisle and Blaine Jeffries of MITRE join the Claroty Nexus podcast to discuss Caldera for OT, a new set of operational technology plugins for the open source core Caldera adversary emulation platform. Caldera for OT supports the Modbus, BACnet, and dnp protocols, and Belisle and Jeffries hope to add future support for additional protocols. Red and purple teams may use Caldera for OT for adversary emulation in order to understand the exposure of these protocols to attacks. Caldera for OT is available here.
2023-10-05
43 min
ClickCiber
T11x04 - Claroty & IOS-17
Nuestro invitado el Country Manager para España y Portugal de CLAROTY -MADIGATE nos cuenta el impacto de los ciberataques sobre hospitales. Además, damos algunos detalles del nuevo SO de Apple, denominado IOS-17. Con: Carlos Valerdi y Alfonso Calvo. Dirige: Carlos Lillo.
2023-09-29
55 min
Nexus: A Claroty Podcast
Jim LaBonty on the OT Security Stack
Retired Pfizer Chief Information Security Officer Jim Labonty joins the podcast to discuss the operational technology (OT) security stack, and how it differs from IT. This episode provides especially important for the growing number of security leaders who are newly responsible for OT cybersecurity and the safety of cyber-physical systems. Labonty also shares his experience during his time at Pfizer in securing the development of Pfizer's Covid-19 vaccine, and how not only security of the manufacturing process took top priority, but also supply chain security.
2023-09-10
46 min
Defence & Security Podcast Network
CYBER SECURITY UNCUT: What does Australia's new cyber security regulations mean for your business? With Claroty's Leon Poggioli
In this episode of the Cyber Security Uncut podcast, Leon Poggioli, ANZ regional director at Claroty, joins host Liam Garman to discuss new cyber security requirements for Australian businesses, and how organisations can leverage cyber as a competitive advantage. The podcast begins analysing recent findings from Claroty's research arm, Team82, that has discovered 95 IoT CVEs this calendar year alone, before unpacking the new and emerging regulatory requirements for Australian businesses under SLACIP. Poggioli then details common threat vectors impacting businesses including unpatched software and overlooked hardware such as CCTV cameras, and how businesses can create remediation programs to...
2023-09-04
35 min
Smooth Scaling: Revenue Leader Interviews from Insight Partners
Identifying opportunities by leveraging product market fit with Simon Chassar at Claroty
Jeremey interviews Simor Chassar, Chief Revenue Officer at Claroty, about penetrating the market, proliferating the ecosystem, and understanding the value your technology brings to customers. Learn more about Claroty: claroty.com For more growth strategies, visit insightpartners.com/ideas. The content here is for informational purposes only. It should not be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security and is not directed at any investors or potential investors in any Insight Partners fund. For more details, please see insightpartners.com/legal-disclaimer.
2023-08-29
17 min
Nexus: A Claroty Podcast
Stephen Reynolds on Protecting the CISO During Incident Investigations
Stephen Reynolds, a partner at the law firm of McDermott, Will, and Emery, joins the Nexus Podcast to discuss some of the concerns and questions CISOs and other security executives may have about their personal liability and exposure during breach investigations. The short of it: Don’t panic, but don’t be unprepared either. In this case, preparation equates to having personal legal counsel available, and document everything during an incident.Reynolds and Eli Lilly associate VP and assistant general counsel Nick Merker presented on this topic at Black Hat under the context of the case and conviction of f...
2023-08-28
33 min
Nexus: A Claroty Podcast
Team82 on NAS Research, OPC UA Exploit Framework
Team82’s extensive research into network attached storage devices and the ubiquitous OPC UA industrial protocol came to a head recently in Las Vegas with a pair of presentations at Black Hat USA and DEF CON disclosing vulnerabilities in Synology and Western Digital NAS cloud connections and the unveiling of a unique OPC UA exploit framework. In this episode of the Nexus podcast, researcher Noam Moshe explains how both research initiatives came to be, the implications of each for users, and how the respective ecosystems have been made safer. Read our Synology researchRead our...
2023-08-20
34 min
Nexus: A Claroty Podcast
Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk
In this episode of the Nexus podcast, Bishop Fox researchers Dan Petro and David Vargas explain their research into the Open Supervised Device Protocol (OSDP), meant to bring encryption to badge readers and controllers providing physical access controls at secure facilities. Petro and Vargas explain a number of protocol weaknesses and vulnerabilities that defeat OSDP's promise of encryption and security. Through the attacks they describe, they're able carry out—among others—replay or downgrade attacks, which are enabled by severe key exchange vulnerabilities or weakened crypto keys as described in the protocol.Petro and Vargas unveiled this rese...
2023-08-13
26 min
Nexus: A Claroty Podcast
Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector
Jennifer Lyn Walker, Director of Infrastructure Cyber Defense for the WaterISAC, joins the Nexus podcast to discuss the state of cybersecurity within the water and wastewater critical infrastructure sector. Walker explains where the cybersecurity technology, funding, and skills gaps currently exist among smaller—and larger—water providers. She also covers recent improvements from water utilities, and what, in an ideal world, the cybersecurity industry and government could do to help.
2023-08-03
46 min
Security Voices
Episode #57: Claroty’s Galina Antova on the global infrastructure war & building an $100M OT security juggernaut
This past weekend, the New York Times posted an article explaining the United States is scrambling to clean government systems from a deep, pervasive infiltration of the country’s infrastructure by the Chinese. Much like the Russian attacks on Ukrainian infrastructure, the intent appears to be to disrupt any U.S. action that would be a response to Chinese military action in Taiwan. The role of nation state actors in driving the threat landscape has brought us to a place where the lines between physical and cybersecurity are no longer blurry, but simply erased.Galina Antova, founder and Ch...
2023-07-31
1h 06
Nexus: A Claroty Podcast
Kathleen Moriarty on CIS' IoT Security Guidance
Kathleen Moriarty, Chief Technology Officer of the Center for Internet Security (CIS) joins the Nexus podcast to discuss CIS' recently published IoT Embedded Security Guidance. The document walks vendors, developers, DevOps professionals through the most commonly used IoT protocols and analyzes them from a security perspective. The aim is to help vendors and developers with this selection process and assist with building security in at the protocol level. Download the guidance here.
2023-07-16
38 min
Nexus: A Claroty Podcast
Walter Risi on the CISO's Journey from IT to OT
Walter Risi, Global OT Lead and the Technology and Cyber Security Consulting leader at KPMG in Argentina, joins the Nexus podcast to discuss the CISO's journey from IT to OT. Risi explains what's driving this convergence of security disciplines, and the challenges security leaders are facing across industries. You'll also learn why resilience should be the goal of enterprise security programs, the tools and experience necessary to successfully converge IT and OT security operations, and the importance of bringing cybersecurity awareness and experience to OT engineers and operators.
2023-07-09
35 min
Nexus: A Claroty Podcast
Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research
Claroty Team82's Noam Moshe joins the Nexus podcast to discuss a recent research collaboration with OTORIO looking at Teltonika's 4G industrial routers and cloud management platforms. Eight vulnerabilities were uncovered and patched by the vendor in a recent update. Moshe discusses the vulnerabilities, attack vectors involved, and the state of secure development for IIoT routers. Read Team82's report: "Triple Threat: Breaking Teltonika Routers Three Ways"
2023-05-30
16 min
Nexus: A Claroty Podcast
Charles Carmakal on Cybersecurity Threats to Healthcare
Mandiant Chief Technology Officer Charles Carmakal joins the Claroty Nexus podcast to discuss real-world threats to healthcare organizations. Mandiant has a unique vantage point as an incident response team involved in many high-profile cyberattacks. Based on that insight, Carmakal is able to comment on the conventional and opportunistic attacks healthcare delivery organizations and providers are dealing with. Some of those include multifaceted extortion as well as intellectual property theft. He also discusses whether attacks targeting medical devices are a reality.
2023-05-24
37 min
Nexus: A Claroty Podcast
Lorrie Cranor on IoT Security and Privacy Labels
Lorrie Cranor, Director and Bosch Distinguished Professor in Security and Privacy Technologies at Carnegie Mellon University's CyLab, joins the Nexus podcast to discuss an IoT security and privacy label initiative under way at CyLab. The labels are meant not only to help consumers make informed buying decisions, but also to nudge vendors and manufacturers closer toward delivering secure smart devices to market.
2023-04-27
32 min
Nexus: A Claroty Podcast
Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity
Skip Sorrels, director of cybersecurity at Ascension Technologies, which oversees the technology needs for Ascension Healthcare, one of the country’s biggest non-profit healthcare providers, joins the Nexus podcast to discuss the 405(d) Task Group's Health Industry Cybersecurity Practices (HICP).The HICP identifies top cybersecurity threats to the healthcare industry, and 10 blocking-and-tackling mitigation practices and sub-practices aimed at not only larger, more resourced organizations, but also smaller healthcare providers.
2023-04-18
41 min
Nexus: A Claroty Podcast
Dave Elfering on Cyber Liability Insurance
Dave Elfering, senior vice president at Marsh, a global insurance broker and risk management company, joins the Nexus podcast to discuss the current state of cyber insurance. A longtime figure in information security, Elfering explains the current volatility around coverage, premiums, and exclusions. He goes deep into what can sometimes be contentious discussions about qualifications and controls that must be implemented in order to be eligible for coverage, in addition to policy exclusions.
2023-04-10
42 min
Defence & Security Podcast Network
CYBER SECURITY UNCUT: Defending Australia's healthcare system from cyber attacks, with Claroty's Joshua Corman
Cyber Security Uncut presents a new quarterly podcast series with Claroty. In this first episode, the company's vice-president of cyber safety strategy, Joshua Corman, talks to host Liam Garman to shed light on how cyber criminals can remotely access medical devices and healthcare infrastructure — threatening human safety. The pair begin the podcast discussing Corman's experience as a white hat hacker, before analysing the extent to which medical devices can be accessed by cyber criminals. Corman and Garman then discuss how attacks against healthcare providers can be a simple task for some hackers, and those fundamental steps that hospi...
2023-03-27
44 min
Nexus: A Claroty Podcast
Vera Mens on Akuvox E11 Vulnerabilities
Team82 researcher Vera Mens joins the Nexus podcast to discuss her research that uncovered 13 vulnerabilities in the popular Akuvox E11 smart intercoms. These devices are used to control access to offices, residential, and commercial establishments. The vulnerabilities range in severity, and pose serious privacy implications for users. Vera will discuss her research and a challenging disclosure withe vendor that began 15 months ago. Read Team82's technical report on this research here. Read Team82's blog here.
2023-03-22
21 min
Nexus: A Claroty Podcast
Adm. Mike Rogers on the National Cybersecurity Strategy
Adm. Mike Rogers, USN (Ret.) joins the Nexus podcast to discuss the recently released National Cybersecurity Strategy, the first such strategy from the Biden administration. The strategy codifies many of the cyber-physical systems security initiatives the White House has produced since 2021 in the aftermath of the Colonial Pipeline ransomware attack. Adm. Rogers shares his past contributions to previous strategies, and provides insight into the document's five pillars and how they will impact critical infrastructure security in the near term.
2023-03-09
39 min
Nexus: A Claroty Podcast
Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity
Katherine Gronberg, head of government services at cybersecurity venture capital firm NightDragon, joins the Nexus Podcast to discuss what's driving the federal government's renewed interest and investment in OT and IoT cybersecurity. Katherine brings insight from her unique perspective on these issues, especially as it pertains to upcoming requirements facing asset owners and operators, how vendors must respond to mandates put out by the White House, and what might be in the impending national cybersecurity strategy from the White House Office of the National Cyber Director.
2023-02-09
43 min
Nexus: A Claroty Podcast
Noam Moshe on a Generic WAF Bypass Technique
Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors' web application firewalls.This research was presented at Black Hat Europe and on the Team82 blog. The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious. All of the leading vendors have since added JSON support to their SQL injection processes.
2022-12-19
30 min
Nexus: A Claroty Podcast
Sharon Brizinov on Hacking IoT
Claroty Team82 Director of Research Sharon Brizinov joins the podcast to discuss the recent Pwn2Own Toronto event. Brizinov was successful in three categories at the event, finding and exploiting zero day vulnerabilities in two network-attached storage devices and a popular router. In this episode, Brizinov explains his preparation for the contest, and compares and contrasts hacking industrial control systems and internet of things connected devices.
2022-12-12
26 min
Defence & Security Podcast Network
CYBER SECURITY UNCUT: Keeping our infrastructure safe in turbulent times, with Claroty's Lani Refiti
In this episode of the Cyber Security Uncut podcast, Lani Refiti, regional director – Australia/New Zealand at Claroty, joins host Liam Garman to unpack the relationship between cyber security, critical infrastructure and national security — and how this evolving sector impacts every Australian. The pair begin the podcast discussing how IT security incidents relate to critical infrastructure, and Claroty's expertise in protecting the nation's essential assets. Refiti then details some of the emerging cyber trends impacting Australian industry, civilian infrastructure and national security. The pair wrap up the podcast discussing those emerging cyber and geop...
2022-11-28
34 min
Nexus: A Claroty Podcast
Joe Slowik on TRITON Malware, XENOTIME Hacking Group
Joe Slowik, threat intelligence and detections lead at Gigamon, joins the podcast to discuss the XENOTIME hacking group, the entity believed to be responsible for the 2017 Triton attack. Triton was deployed within a petrochemical facility in Saudi Arabia and triggered a fault in the Schneider Electric Triconex Safety Instrumented Systems that initiated a shutdown of the plant. The Triton intrusion and malware deployment could have been much worse, resulting in harmful physical consequences and loss of life. Slowik's recent Virus Bulletin paper and presentation describes the complex ecosystem behind XENOTIME, its connections to Russian intelligence, and the...
2022-10-29
42 min
Nexus: A Claroty Podcast
Inside Team82's EvilPLC Attack
Team82's Noam Moshe, one of the researchers involved in developing the EvilPLC attack, discusses the technique of using a weaponized programmable logic controller to compromise an engineer's workstation and gain access to other PLCs on the OT network. Read more about the EvilPLC techniqueDownload Team82's paper on EvilPLC
2022-10-20
22 min
Nexus: A Claroty Podcast
Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List
Sarah Fluchs, CTO at Admeritia, joins the Aperture podcast to discuss the Top 20 Secure PLC Coding Practices List. Written for engineers by engineers, the list provides recommendations that can be used to securely design and code programmable logic controllers (PLCs). The first iteration of the list was published in 2021, and since then, its core group of maintainers has grown to 75 and more than 1,000 engineers and experts registered as contributors. The list has been prominent referenced in training materials and other resources, including the NATO guide for protecting automation and control systems, and MITRE is considering integrating the...
2022-09-30
47 min
Nexus: A Claroty Podcast
Vergle Gipson on Cyber-Informed Engineering
Vergle Gipson, senior advisor, at Idaho National Lab's Cybercore Integration Center, joins the podcast to discuss cyber-informed engineering and the maturing discipline of operational technology (OT) cybersecurity. Gipson recently testified before a House Committee on Homeland Security about the need to secure industrial control systems against cyberattacks. One of the recommendations he suggested to the committee was the need for cyber-informed engineering, which has parallels to secure software development for IT. Gipson discusses CIE and the need for cyber-physical system security and critical function assurance.
2022-09-28
44 min
Nexus: A Claroty Podcast
Noam Moshe on the Evil PLC Attack
Claroty Team82 researcher Noam Moshe joins the podcast to discuss the Evil PLC Attack research published recently. Evil PLC is a technique whereby a weaponized PLC is used to compromise an engineering workstation in order to move deeper onto the OT network, the enterprise network, or other PLCs. Read Team82's blog here. Download our technical paper here (free PDF).
2022-08-19
33 min
Nexus: A Claroty Podcast
Dan Gunter on Threat Hunting in Industrial Control Systems
Insane Forensics CEO and founder Dan Gunter joins the Aperture podcast to discuss threat hunting approaches inside industrial control systems (ICS) and operational technology (OT) networks. Gunter describes how Shodan can be used to understand exposures within an industrial network and threats posed by trust relationships to the OT network. Gunter explains what asset operators and owners need in place to begin threat hunting, what they should be looking for, and how to use tools such as Shodan to their greatest effect.
2022-07-18
38 min
Nexus: A Claroty Podcast
Dan Ricci on the ICS Advisory Project
Dan Ricci joins the podcast to discuss the ICS Advisory Project. Ricci founded the project in 2018, which provides vulnerability management teams with a searchable, intuitive dashboard that visualizes industrial control system security and vulnerability advisories and threat data. In this episode, Ricci explains how the ICS Advisory Project got off the ground, some of the features it currently offers, how it can be used by security analysts and OT operators, and where he imagines the project will be in a year as new features are added and refined.
2022-07-06
33 min
Nexus: A Claroty Podcast
Vera Mens on Hacking Flow Computers
Claroty Team82 researcher Vera Mens joins the podcast to discuss her BSides Tel Aviv presentation today called, "Total Flaw: Hacking Flow Computers for Fun and Free Gas." Flow computers calculate flow rates for gas, oil, and more, and could be a key target for an experienced attacker who is looking to disrupt or damage a process in the oil and gas industry. Mens uncovered two vulnerabilities that gave her access to a vendor's flow computer and allowed her to write code to the device; the vulnerabilities have been patched, and she shared some details in her talk to...
2022-06-30
38 min
Nexus: A Claroty Podcast
Don C. Weber on ICS Cybersecurity Training, Education
Don C. Weber, founder of Cutaway Security, joins the podcast to discuss his extensive career in information security, his journey to industrial control system cybersecurity, and his desire to educate, train and mentor others in the community.Weber’s business focuses on security services for industrial environments through program reviews, security assessments, penetration testing, and training. He is also a SANS instructor and a fixture at Black Hat/DEF CON and other major events. He also runs the excellent Friday InfoSec Chats, you can find those on Youtube.
2022-06-16
46 min
Nexus: A Claroty Podcast
Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)
Tim Huddleston of Idaho National Laboratory joins the Aperture podcast to discuss the INL Control Environment Laboratory Resource (CELR). CELR is a simulated critical infrastructure environment where users may test their incident response capabilities against real-life attack scenarios. Users may also use the environment to conduct malware and vulnerability analysis of ICS and SCADA devices, and also test product capabilities against simulated cyber-physical attacks. Learn more about CELR here.
2022-06-02
46 min
Nexus: A Claroty Podcast
Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework
Thomas Schmidt of the German Federal Office for Information Security and Martin Scheu, an OT Security Engineer at SWITCH-CERT, join the podcast to discuss the Common Security Advisory Framework (CSAF). CSAF automates the largely manual task of gathering security advisories and vulnerability remediation information, and then creates standardized, machine-readable advisories that users such as vendors and industry organizations can thus distribute to end users.
2022-05-26
36 min
Nexus: A Claroty Podcast
Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools
Mandiant senior technical analysis manager Daniel Kapellmann Zafra joins the Claroty Aperture podcast to discuss the Incontroller/Pipedream attack tool. Incontroller is alleged to be a state-sponsored tool specifically designed to target industrial control systems. Incontroller was discovered before it was employed on a victim's network, yet nonetheless it remains one of the most sophisticated, dangerous ICS attack platforms ever developed. Kapellman Zafra discusses Incontroller's three components—Tagrun, Codecall, and OmShell—that give it extreme flexibility in targeting different ICS equipment and communication protocols. You'll also learn about how resilient potential victims may be, as well as some...
2022-05-04
39 min
Nexus: A Claroty Podcast
Sharon Brizinov on Hacking and Securing PLCs
In this episode of the Aperture podcast, Claroty Team82 vulnerability research lead Sharon Brizinov covers a presentation he’s giving at the S4x22 conference in Miami that explains a unique attack against Siemens SIMATIC 1200 and 1500 PLCs that enabled native code execution on the device. Also, Brizinov explains his participation in the Pwn2Own contest. S4 hosts the only ICS-focused version of Pwn2Own, and this year there are four categories of targets in scope: control servers, OPC UA servers, data gateways, and HMIs.“The goal in most cases is to achieve remote code execution, not only to fi...
2022-04-20
34 min
Nexus: A Claroty Podcast
Kylie McClanahan on Automating the Gathering of Vulnerability Information
Kylie McClanahan, a University of Arkansas doctoral student and senior developer at Bastazo, joins the Aperture podcast to discuss her research into automating the gathering of vulnerability remediation and mitigation information from vendors and third-party sources. McClanahan explains how she and colleagues have used machine learning, natural language processing, and keyword techniques, among others, to parse mitigation advice from vendor advisories and alerts from third-party sources such as NVD. These advisories often have incomplete mitigation information that's especially valuable in OT environments where asset owners must rely on mitigations when patches aren't either available or devices cannot...
2022-03-29
41 min
Nexus: A Claroty Podcast
Sean Tufts on OT SOC Playbooks, Culture Challenges
Sean Tufts, ICS and OT security practice director at Optiv, joins the Claroty Aperture podcast to discuss some of the security technology and cultural challenges facing industrial enterprises as they deal with digital transformation and convergence. Tufts, a former NFL player and college football star, also shares his non-conventional career path to OT cybersecurity and how some of the skills translate from pro sports to his second career.
2022-02-24
40 min
Nexus: A Claroty Podcast
Patrick Miller on Securing Critical Infrastructure in a Time of Conflict
Veteran ICS cybersecurity expert Patrick Miller joins Claroty's Aperture podcast to discuss the proactive measures ICS cybersecurity managers and OT asset owners and operators should be taking right now in light of geopolitical tensions around the world. Miller recently wrote a blog explaining what and how electric utilities and other CI organizations should be communicating and sharing in the event of conflict between Russia and Ukraine spilling over onto the internet. He elaborates on that piece in this discussion, as well as his experience in helping to get the NERC CIP standards off the ground, how the standard...
2022-02-17
43 min
TRC Talks
Partner Spotlight: Claroty
In this partner spotlight episode, Brandon Singh, Networking Specialist with The Reynolds Company, is joined by Ed Williams of Claroty, for a discussion on industrial cybersecurity.Contact The Reynolds Company specialist teamLearn more about ClarotyAdditional Claroty references:Claroty SRA: Introduction https://youtu.be/8eHIbmv5sT8Claroty Edge: Network Visibility in Minutes https://youtu.be/XlXHzKmozwIThe Complete Claroty Platform: Key Benefits (CTD + SRA) https://youtu.be/U3i91KDKhBgClaroty SRA Intro DEMO: https://youtu.be/ofOXHPFcCIwClaroty SRA Deep-Dive DEMO: https://youtu.be/FjFfHHwUcFw (20:00 min ru...
2022-02-04
37 min
Nexus: A Claroty Podcast
OT-ISAC on Information-Sharing, Incident Recovery
Bill Nelson, director and officer of the OT-ISAC, joins the podcast to discuss the growing need for adequate sharing of threat intelligence and incident information among operational technology professionals, including asset owners and security practitioners. Nelson explains some of the information-sharing challenges that continue to shadow ISACs, and why member organizations may be hesitant to share incident details. He also discusses a new operational resilience framework in development that will soon be released for public comment and feedback, and how that ties into the need for more discussions on incident response and recovery. --Claroty's research...
2022-01-30
41 min
Nexus: A Claroty Podcast
Tom VanNorman on OT Cybersecurity Skills Gap
ICS Village cofounder Tom VanNorman joins the Aperture podcast to discuss the recently announced Cybersecurity & Industrial Infrastructure Security Apprenticeship Program that aims to improve cybersecurity knowledge within operational technology. ICS Village is part of a consortium behind this apprenticeship program along with Siemens Energy, SANS Institute, and a number of academic institutions. The aim is to integrate academic classes, training, and real-world job rotations at leading industrial companies. Tom also discusses the next iteration of ICS Village at the upcoming RSA Conference in June.
2022-01-12
40 min
Nexus: A Claroty Podcast
Claroty, JFrog on Fuzzing BusyBox
Claroty researcher Vera Mens and JFrog researcher Shachar Menashe join the podcast to discuss a recent research collaboration between the two companies that looked at the security of BusyBox. Busybox is a popular embedded Linux utility suite, and is found everywhere in operational technology, including in devices such as PLCs, HMIs, and RTUs.The researchers published a paper that describes 14 vulnerabilities uncovered in BusyBox—all of which were patched—and the custom fuzzing harnesses used to trigger the bugs. The harnesses were released to open source by Claroty and can be found on GitHub.
2021-11-28
38 min
Nexus: A Claroty Podcast
ZDI's Dustin Childs on Pwn2Own Miami
Dustin Childs of the Zero Day Initiative (ZDI) joins Claroty's Aperture podcast to discuss the upcoming Pwn2Own Miami hacking contest. This is the only hacking contest focused on finding zero-day vulnerabilities in industrial control systems (ICS) and operational technology (OT), and it will be held during the S4 conference in January. Childs is a veteran of the security industry and Pwn2Own, which is 16 years old. Pwn2Own Miami will be the second such event with an ICS focus. Researchers will compete for a prize pool over more than $300,000; four technology categories are in scope at t...
2021-11-15
35 min
Defence & Security Podcast Network
CYBER SECURITY UNCUT: Protecting Australia's critical infrastructure with Lani Refiti, regional director, ANZ at Claroty
In this week's podcast, Lani Refiti, regional director, ANZ at Claroty, joins hosts MAJ GEN (Ret'd) Marcus Thompson and Phil Tarrant, director – defence and security at Momentum Media, to discuss securing Australia's critical infrastructure amid an evolving cyber threat landscape. The podcast begins by analysing the latest news and updates from the cyber security industry, including balancing workforce demands for privacy despite remote work, as well as the latest in a long string of cyber attacks overseas. The trio then dives into analysing Claroty's core business offering as an industrial cyber security company, foc...
2021-11-15
29 min
Nexus: A Claroty Podcast
Exploring and Navigating OT for CISOs
Splunk OT security strategist Chris Duffey and Global Advisory CISO Doug Brush join Claroty's Aperture podcast to discuss how CISOs can and must navigate the world of industrial control system (ICS) and operational technology cybersecurity. Digital transformation and convergence have forced IT and OT under the same umbrella for many industrial enterprises and critical infrastructure. For many CISOs, managing OT cybersecurity is a whole new world of risk management strategies, technologies, and vendors. Duffey and Brush explain some of the success stories they've experienced with CISOs who have had to close knowledge, technology, and experience ga...
2021-11-10
42 min
Nexus: A Claroty Podcast
Gary E. Miller on the GPSD Bug
Gary E. Miller, principal maintainer of GPSD, joins the Aperture Podcast to discuss a bug in this service that potentially could have caused some disruptions on devices that rely on global positioning systems for precise time-keeping. GPSD is a service daemon that extracts time information from GPS appliances. GPSD can be found in anything from mobile phones, to submarine navigation systems, and satellites. There are also industrial applications that reply on GPS for timing, including flow meters in pipelines, for example. A bug was discovered earlier this year in the GPSD code that could have rolled back ti...
2021-10-27
39 min
Nexus: A Claroty Podcast
Top 20 Secure PLC Coding Practices List
Martin Scheu and Dirk Rotermund of the Top 20 Secure PLC Coding Practices project join Claroty's Aperture podcast to discuss how engineers can integrate secure coding practices into PLC programming. The group's list of secure coding practices was released earlier this year and is available as a free download. It’s a 44-page document that includes not only the list of secure coding practices, but also detailed guidance for each, and where they map to on certain frameworks such as MITRE ATT&CK. In this discussion, you'll learn more about how this project came together, the current state of...
2021-09-28
40 min
Nexus: A Claroty Podcast
Dennis Fisher on 'When Bug Bounties Went Boom'
Decipher Editor in Chief Dennis Fisher joins the podcast to discuss a series he recently published on the history and evolution of bug bounties. In the series, Dennis talks to the hackers and researchers who took an idea and turned it into one of information security's most well-known and lucrative industries. In this episode, Fisher covers the early days of bug bounties, the No More Free Bugs movement, the legal landmines researchers faced doing vulnerability research—essentially for free—the gray markets for bugs and exploits, and how pioneers such as Katie Moussouris worked tirelessly to make bug boun...
2021-09-20
42 min
Nexus: A Claroty Podcast
Tom Pace on SBOMs for ICS and OT
Tom Pace, founder of security company NetRise joins Claroty's Aperture Podcast to discuss SBOMs, or software bill of materials, and how they can be leveraged to improve industrial control system and operational technology cybersecurity. SBOMs are analogous to ingredient labels on food products, or parts lists for automobiles. Yet for ICS and OT equipment, they are a rarity. That lack of visibility into software and firmware components puts organizations at risk in the event of an incident, or can hamper risk management efforts. Pace discusses the value proposition of SBOMs, how they can be created...
2021-08-22
48 min
Nexus: A Claroty Podcast
Tony Baker on OT Cybersecurity Challenges, CIP Security
Rockwell Automation Chief Product Safety and Security Officer Tony Baker joins the Claroty Aperture podcast to discuss the rash of cybersecurity challenges facing critical infrastructure and industry owners and operators. Baker is a Rockwell veteran and has specialized in cybersecurity for the last eight years. He shares his insight on some of the challenges and resource gaps defenders are facing today, as well as the short- and long-term impact of the high-profile industrial cybersecurity incidents that have dominated headlines in 2021. Baker also discusses the evolution and adoption of CIP Security, a critical defense-in-depth technology that brings authentication, in...
2021-08-11
37 min
Nexus: A Claroty Podcast
Inside the Water Sector Cybersecurity Survey
Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center (WaterISAC), joins Claroty's Aperture podcast for a deep dive into the results of the recently released Water Sector Coordinating Council's cybersecurity survey. In short, the water sector needs cybersecurity help from industry organizations and the federal government. Respondents, identified four critical areas of need ranging from training, to improved cybersecurity tools and threat information, to money allocated from the federal government via loans and grants. While there were encouraging signs around the amount of risk assessment happening within the sector, that's offset by da...
2021-07-02
33 min
Nexus: A Claroty Podcast
Adm. Mike Rogers on Ransomware and OT
Retired Adm. Mike Rogers, former NSA Director and U.S. Cyber Command Commander, joins Claroty's Aperture Podcast to lend his insight and expertise into the rash of ransomware attacks starting to impact operational technology (OT) environments and critical infrastructure. Rogers covers the risk assessments that industrial enterprises are undertaking to handle the ransomware threat, and how to best response in the event of an incident. The discussion also ranges into:Cyber resilience in OT environmentsThe debate on whether to pay extortion demands or ransomsThe role of cyber-insurance is playing in defensive strategies, How the government should be...
2021-06-25
42 min
Augment
Neo4j, KeepTruckin, Nylas, Beamery, Claroty, Twine, Unit, Internxt, Akur8, Eqtble and Transform raises funds | Vitosha Venture Partners has launched its €26 million fund to invest in about 100 early to growth-stage companies
Neo4j, a provider of graph database platform for organizations, has announced its raise of $325 million in a Series F round led by Eurazeo, at a valuation of $2 billion. According to the company, this transaction represents the largest investment in any private database firm. KeepTruckin, a unicorn company helping trucking companies in fleet management to increase their productivity, safety, and efficiency, has netted $190M in Series E funding. This round raises its valuation from a previously achieved billion to $2.3B. The proceeds will be used to scale its engineering team.Bulgarian-based Vitosha Venture Partners has l...
2021-06-18
04 min
The bluEPrint by Executive Platforms
Cyber Security for Manufacturing – A Conversation with Justin Woody and Gary Liebowitz of Claroty
North American Manufacturing Excellent Summit 2021 was held virtually due to COVID19, but that did not prevent hundreds of senior manufacturing executives and the service and solution providers relevant to their interests from coming together to network, benchmark, learn, and share with one another during what has been a difficult year in uncharted business territory.In this interview, Justin Woody and Gary Liebowitz of Claroty share some of their experiences and insights on how the new generation of powerful interconnected digital tools that is transforming manufacturing requires a new generation of cyber security, and how IT and OT...
2021-06-17
18 min
Nexus: A Claroty Podcast
Mandiant on Low-Sophistication OT Attacks
Mandiant Threat Intelligence Senior Manager Nathan Brubaker joins the Aperture Podcast to discuss the growing trend of low-sophistication attacks targeting operational technology and industrial control systems. Nathan coauthored a recent Mandiant report on the subject, identifying a number of trends worth monitoring as industrial enterprises continue to connect OT to the internet and converge IT and OT systems internally. Attackers are exploiting connectivity to sometimes interact with industrial processes, but more often to capitalize financially on their access through ransomware, or to gather information about exposed assets that can be shared or sold. Na...
2021-06-08
42 min
Nexus: A Claroty Podcast
E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity
Manny Cancel, CEO of the Electricity-ISAC, joins the Aperture podcast for a wide-ranging discussion on cybersecurity issues affecting electricity utilities and critical infrastructure. Cancel shares his thoughts on the Biden Administration's recent announcement of a 100-day plan to improve electricity and power grid cybersecurity. Specifically, the plan calls for the identification and deployment of technologies and systems that improve situational awareness and response capabilities for electricity providers. Cancel also discusses threats facing electric utilities, threat actors targeting the sector, and what technology and human-resource gaps exist. Finally, Cancel describes how the E-ISAC works with its members on information-sharing, and...
2021-05-18
33 min
Nexus: A Claroty Podcast
Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress
Luta Security founder, security entrepreneur, and vulnerability disclosure pioneer Katie Moussouris joins the Aperture Podcast to talk about influential researcher Dan Kaminsky, who died April 23 at 42 years old. Katie discusses the breadth of Dan's work as a researcher, and his friendship, empathy, and outreach within the security community. Katie also talks about her work advocating for pay, gender and employment equity, and how her mother persevered as a single mother earning significantly less than male counterparts. Katie also explains her return to her hacker roots uncovering two serious vulnerabilities in the audio-based social networking app, Clubhouse, and th...
2021-04-29
41 min
Nexus: A Claroty Podcast
Kaspersky, Claroty on OPC Security Research
On this episode of Claroty's Aperture Podcast, researchers from Claroty and Kaspersky join to discuss security research into the OPC protocol. OPC is a protocol stack that is used for interoperability between disparate vendor communication protocols in the ICS domain. Kaspersky's Evgeny Goncharov and Claroty's Sharon Brizinov and Uri Katz bring their respective experience researching OPC and discuss why it's a critical protocol for OT networks. In 2018, Kaspersky Lab published some of the earliest research into OPC security and disclosed 17 new vulnerabilities in the stack. This year, Claroty followed with its own research and nine vulnerabilities found in...
2021-03-30
43 min
Nexus: A Claroty Podcast
Josh Grunzweig on Exchange Zero Days
Josh Grunzweig of Volexity joins the Aperture Podcast to discuss the Microsoft Exchange zero-day vulnerabilities and exploits that have been dominating headlines. Tens of thousands of organizations have already been compromised by attack groups using this bug to dump corporate email, and carry out further attacks such as ransomware or deploying cryptocurrency mining software. Josh's team at Volexity was the first to report in-the-wild exploits of the Exchange zero days, and in this episode, he describes the initial discovery of these attacks, and the short- and long-term implications for enterprises worldwide.
2021-03-17
34 min
Nexus: A Claroty Podcast
Mauro Conti on Assessing the Use of Insecure ICS Protocols
Prof. Mauro Conti of the University of Padua, Italy joins the Aperture Podcast to discuss a paper he coauthored last year called Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. The paper, co-written with Giovanni Barbieri, Nils Ole Tippenhauer, and Federico Turrin of the University of Padua and the Helmholtz Center for Information Security, examines the gaps and exposures presented by connecting industrial control systems to external networks. Many of these networks and devices are communicating over insecure protocols that are insecure by design, lacking encryption or authentication, or are misconfigured.
2021-03-10
31 min
Nexus: A Claroty Podcast
Water ISAC on Oldsmar Hack, Sector Cybersecurity
Jennifer Lyn Walker and Michael Arceneaux of the Water ISAC join the podcast to discuss the recent cybersecurity incident at the Oldsmar, Fla., water-treatment facility, the state of cybersecurity inside the water & wastewater critical infrastructure sector, and whether organizations are reticent about sharing information about attacks with others in the sector. Walker is a cyber threat analyst with the Water ISAC, while Arceneaux is managing director of the organization. Water ISAC has more than 400 member utilities serving much of the United States.
2021-02-23
41 min
Nexus: A Claroty Podcast
Justin Searle on Pen-Testing ICS
Justin Searle, director of ICS security at InGuardians and a SANS Institute ICS security senior instructor, joins the Aperture podcast to discuss penetration testing ICS environments. Justin is a leader in the ICS security community, a 21-year veteran immersed in conducting and teach security assessments worldwide. In this episode, Justin discusses the challenges in pen-testing production industrial environments, the state of pen-testing tooling for ICS, how digital transformation and IT/OT convergence are changing the way cybersecurity is managed inside enterprises, and also industrial cybersecurity threats facing companies.
2021-01-21
39 min
Nexus: A Claroty Podcast
Tom Tervoort on Zerologon
Tom Tervoort, a senior security specialist with Netherlands-based Secura, joins the Aperture Podcast to discuss the Zerologon vulnerability in Windows Netlogon. This critical crypto bug in the Netlogon authentication mechanism was discovered by Tom and the Secura team, and patched in August by Microsoft. Since then, exploit code has surfaced and the vulnerability has been used by two separate APT groups. Tom discusses how he "accidentally" discovered Zerologon, the risks posed by successful exploits, how and why APTs might use it, and the resources required to use it in attacks against Active Directory, domain controllers, and other Windows a...
2020-12-18
41 min