Look for any podcast host, guest or anyone
Showing episodes and shows of

Cybellum Technologies LTD

Shows

Left to Our Own DevicesLeft to Our Own DevicesJB Baker: Computational Storage and Product SecurityWe sat down with the Seagate, Intel, and ScaleFlux veteran to discuss innovations in storage technologies, emerging threats, and cybersecurity.2025-01-2237 minLeft to Our Own DevicesLeft to Our Own DevicesBryan Kissinger: Cybersecurity - A Business-Minded PerspectiveWe sat down with the seasoned IT and cybersecurity leader and CISO at Trace3 to discuss emerging cyber threats, aligning security with business goals, and tailoring “right-sized” security programs. We also discuss balancing innovation with compliance and how military leadership principles influence corporate cybersecurity strategies.2025-01-0822 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistErrol Weiss: From Banking to Healthcare Cybersecurity Podcast: Left to Our Own DevicesEpisode: Errol Weiss: From Banking to Healthcare CybersecurityPub date: 2024-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe sat down with the Health-ISAC Chief Security Officer to discuss his 25-year career spanning banking, government, and healthcare to identify the biggest cybersecurity threats and trends impacting the healthcare industry in 2025 and beyond.The podcast and artwork embedded on this page are from Cybellum Technologies LTD, which is the property of its owner and not affiliated with or...2024-12-1924 minLeft to Our Own DevicesLeft to Our Own DevicesErrol Weiss: From Banking to Healthcare CybersecurityWe sat down with the Health-ISAC Chief Security Officer to discuss his 25-year career spanning banking, government, and healthcare to identify the biggest cybersecurity threats and trends impacting the healthcare industry in 2025 and beyond.2024-12-1724 minLeft to Our Own DevicesLeft to Our Own DevicesDr. Hans-Martin von Stockhausen: Cybersecurity Lessons from Siemens HealthineersWe had the privilege of sitting down with Dr. Hans-Martin von Stockhausen, Principal Key Expert in Cybersecurity at Siemens Healthineers, to delve into the intricacies of cybersecurity throughout the product lifecycle. Our conversation explored the delicate balance between device usability and time-to-market pressures, as well as practical tips for enhancing cybersecurity posture.2024-12-0325 minLeft to Our Own DevicesLeft to Our Own DevicesRamakrishnan Pillai: Product Security at LivaNova and BeyondWe sat down with the Head of Product Security at LivaNova, the former Chief Product Security Officer at Elekta and co-chair of the Legacy Devices Task Group at the Health Sector Coordinating Council to discuss what he learned throughout his long and successful career and to gain insights on regulations, security activities and more2024-11-1919 minLeft to Our Own DevicesLeft to Our Own DevicesDorothy Amy: Leading Research at Frost & SullivanWe sat with the Senior Industry Analyst at Frost & Sullivan to learn from her cross-industry experience in automotive, mobility, technology, oil & gas, and manufacturing. We talked about innovation, market strategy, cybersecurity, and consulting for multiple industries, and gathered tips & insights for cybersecurity professionals from her experience across the globe.2024-11-0529 minLeft to Our Own DevicesLeft to Our Own DevicesDanielle Radin: AI Ethics and CybersecurityWe sat down with the Los Angeles Emmy Award-winning journalist and author to discuss global AI ethics, cybersecurity, and the future of Artificial Intelligence.2024-10-2136 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistAaron C. Crow: OT and Product Security (Special Episode) Podcast: Left to Our Own DevicesEpisode: Aaron C. Crow: OT and Product Security (Special Episode)Pub date: 2024-10-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this special episode, David and Shlomi, hosts of the Left to Our Own Devices podcast, sit down with Aaron C. Crow, a seasoned Cyber and Strategic Risk leader with 25 years of experience. Together, they share valuable insights on OT and product security, while also exploring the future direction of the industry.This episode is a republish fr...2024-10-111h 11Left to Our Own DevicesLeft to Our Own DevicesAaron C. Crow: OT and Product Security (Special Episode)In this special episode, David and Shlomi, hosts of the Left to Our Own Devices podcast, sit down with Aaron C. Crow, a seasoned Cyber and Strategic Risk leader with 25 years of experience. Together, they share valuable insights on OT and product security, while also exploring the future direction of the industry.This episode is a republish from Aaron’s own PrOTect It All podcast, where it was originally released.2024-10-071h 11Left to Our Own DevicesLeft to Our Own DevicesJohn Krzeszewski - What's Next for ISO/SAE 21434We sat down with the Cybersecurity & Functional Safety Senior Engineering Specialist at Eaton to discuss the intersection of safety and security in the automotive world, upcoming updates to ISO/SAE 21434, and learn from his vast experience in the automotive and medical device industries.2024-09-2432 minLeft to Our Own DevicesLeft to Our Own DevicesJens Gellynck: From QA to Leading Product Security at BarcoWe sat down with the Product Security Officer - Healthcare at Barco to discuss the intersection of QA and Product Security, the Secure Software Development Life Cycle, and cybersecurity standards from NIST and IEC.2024-09-1730 minLeft to Our Own DevicesLeft to Our Own DevicesMelissa Rhodes: Leading Product Security at MedtronicWe sat down with Melissa Rhodes, the Product Security Program Manager at Medtronic and an MDM security thought leader for a fun and insightful conversation about SBOMs and her journey from firmware engineering to leading product security.2024-09-1032 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistHeather Vermillion: PACCAR, Security & Personal Growth Podcast: Left to Our Own DevicesEpisode: Heather Vermillion: PACCAR, Security & Personal GrowthPub date: 2024-08-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of "Left to Our Own Devices," we dive into the world of automotive cybersecurity with Heather Vermillion, a security engineer at PACCAR, who shares her journey from the Department of Defense to safeguarding advanced automotive technologies, while also championing the next generation of cybersecurity professionals.The podcast and artwork embedded on this page are from Cybellum Te...2024-08-2835 minLeft to Our Own DevicesLeft to Our Own DevicesHeather Vermillion: PACCAR, Security & Personal GrowthIn this episode of "Left to Our Own Devices," we dive into the world of automotive cybersecurity with Heather Vermillion, a security engineer at PACCAR, who shares her journey from the Department of Defense to safeguarding advanced automotive technologies, while also championing the next generation of cybersecurity professionals.2024-08-2735 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistRobert Putman: From PlayStation to ABB Podcast: Left to Our Own DevicesEpisode: Robert Putman: From PlayStation to ABBPub date: 2024-08-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Left to Our Own Devices, Rob Putman, Global Manager of Cybersecurity Services at ABB, shares his journey from Sony PlayStation to leading cybersecurity in industrial automation. Tune in for insights on product security and industrial control challenges.The podcast and artwork embedded on this page are from Cybellum Technologies LTD, which is the property of it...2024-08-1440 minLeft to Our Own DevicesLeft to Our Own DevicesRobert Putman: From PlayStation to ABBIn this episode of Left to Our Own Devices, Rob Putman, Global Manager of Cybersecurity Services at ABB, shares his journey from Sony PlayStation to leading cybersecurity in industrial automation. Tune in for insights on product security and industrial control challenges.2024-08-1340 min@BEERISAC: OT/ICS Security Podcast Playlist@BEERISAC: OT/ICS Security Podcast PlaylistBonus Episode: Dr. Allan Friedman Returns: CISA SBOM-a-Rama 2024 Podcast: Left to Our Own DevicesEpisode: Bonus Episode: Dr. Allan Friedman Returns: CISA SBOM-a-Rama 2024Pub date: 2024-08-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, Dr. Allan Friedman from CISA returns to discuss the upcoming SBOM-a-Rama, a pivotal event in supply chain cybersecurity. He shares insights on the evolution of SBOMs, the significance of community collaboration, and what to expect from this year's hybrid event, including a showcase of innovative SBOM solutions.The podcast and artwork embedded on this pa...2024-08-0922 minLeft to Our Own DevicesLeft to Our Own DevicesBonus Episode: Dr. Allan Friedman Returns: CISA SBOM-a-Rama 2024In this episode, Dr. Allan Friedman from CISA returns to discuss the upcoming SBOM-a-Rama, a pivotal event in supply chain cybersecurity. He shares insights on the evolution of SBOMs, the significance of community collaboration, and what to expect from this year's hybrid event, including a showcase of innovative SBOM solutions.2024-08-0722 minLeft to Our Own DevicesLeft to Our Own DevicesSamuel Takachicha: From Safari IT to Med Device SecurityIn this episode, we welcome the Director of Product Security at Edwards Life Sciences. Samuel shares his journey from IT roles in a Zimbabwe safari to leading product security in the medical device industry, discussing challenges, solutions, and the impact of FDA regulations on their processes. 2024-07-3029 minLeft to Our Own DevicesLeft to Our Own DevicesTom Alrich Returns: Our Vulnerability Problem (Bonus Episode)In this special bonus episode, we welcome back Tom Alrich, an expert in supply chain cybersecurity to discuss one of the most pressing issues in cybersecurity right now. Tom discusses the current issues with the National Vulnerability Database (NVD) and the challenges it presents for effective vulnerability management. We explore his proposed solutions and the future of software supply chain security, based on his extensive experience.If you'd like to reach out to Tom, his email address is tom@tomalrich.com.Additional links/resources mentioned during the episode or relevant to the discussion (if the...2024-07-2326 minLeft to Our Own DevicesLeft to Our Own DevicesAshwini Siddhi: From Dell to GoDaddyJoin us as we dive into the journey of Ashwini Siddhi, Director of Product Security Engineering at GoDaddy. Ashwini shares her experiences from Dell to GoDaddy, her expertise in threat modeling, and the pivotal role of Bengaluru in her career. We also explore her advocacy for diversity and inclusion in cybersecurity and her influential mentorship with Women in Cyber. 2024-07-1631 minLeft to Our Own DevicesLeft to Our Own DevicesScott Sheahan: From Aerospace to Automotive CybersecurityWe sat down with Scott Sheahan, the owner of Rustic Security, to learn from his rich background in the automotive cybersecurity world and embedded software development. 2024-07-0235 minLeft to Our Own DevicesLeft to Our Own DevicesDmitri Shifrin: Cybersecurity & AI at NVIDIAWe sat down with a System Security Architecture Manager at NVIDIA, to discuss the convergence of Automotive cybersecurity and AI, as well as NVIDIA's Morpheus Cybersecurity Framework.2024-06-1842 minLeft to Our Own DevicesLeft to Our Own DevicesChaitanya Mattur Srinivasamurthy: Leading Cybersecurity at ICU MedicalWe sat down with the Sr Director of Cyber Security & Medical Device Connectivity Engineering at ICU Medical to discuss medical device cybersecurity, FDA, and balancing innovation and security.2024-06-0429 minLeft to Our Own DevicesLeft to Our Own DevicesSteve Orrin: Leading Cybersecurity at Intel and BeyondIn this episode, we talk to Steve Orrin, Chief Technology Officer and Senior PE at Intel Federal, about his unique journey from biology to cybersecurity leadership. We discuss the main challenges faced by federal bodies in the cybersecurity landscape and how they differ across industries like Aerospace, Education, and Healthcare.Steve shares valuable insights on product cybersecurity, emphasizing the growing interest from governments worldwide, as seen in regulations like the FDA Premarket Guidance and the Cyber Resilience Act. He offers advice to vendors, suppliers, and users on navigating this evolving regulatory landscape.2024-05-2132 minLeft to Our Own DevicesLeft to Our Own DevicesMaria Palombini: All About StandardsWe sat down with the Global Practice Leader, Healthcare & Life Sciences at the IEEE Standards Association to discuss cybersecurity standards, regulations, and building a career in cybersecurity2024-05-0938 minLeft to Our Own DevicesLeft to Our Own DevicesMariana Padilla: Leading the HACKERverseWe sat down with the Co-founder and CEO of HACKERverse (Recently known as KIKrr) to discuss Entrepreneurship, product security, and the power of networking.2024-04-2426 minLeft to Our Own DevicesLeft to Our Own DevicesPaul Schmetzler: FDA Regulations, AI and Legal RiskWe chatted with the partner at Clark Hill PLC about AI, FDA regulations, and cybersecurity legal risks, based on his years of experience learning the legal aspects of healthcare and industrial cybersecurity2024-04-0941 minLeft to Our Own DevicesLeft to Our Own DevicesDominique Shelton Leipzig: The Legal Challenge of Cybersecurity & AIWe invited the Partner at Mayer Brown and the leader of the Global Data Innovation team, to discuss the legal aspects of cybersecurity, AI, and privacy, as well as the evolving landscape of responsible AI.2024-03-2628 minLeft to Our Own DevicesLeft to Our Own DevicesRoman Kelser: From Security Research to AIWe sat down with the VP of Research at Cybellum, aka "Roman Explains" to learn from his vast experience in embedded device security research and get practical insights into how to use AI in product security, following the release of his new "Ask Roman" product feature for product security professionals.2024-03-1218 minLeft to Our Own DevicesLeft to Our Own DevicesJoachim Fox: Safety, Security and Innovation at ZFWe were joined by the Director of Safety & Cybersecurity at ZF for a fascinating conversation about innovation in automotive cybersecurity, and ZF's uncompromising approach to both safety and security.2024-02-2738 minLeft to Our Own DevicesLeft to Our Own DevicesFranz-Josef Schuermann: TARA & Threat Modeling StoriesWe sat down with the Chairman of the Board at itemis inc. and the world-renowned TARA expert to discuss innovations in Threat Analysis, automotive cybersecurity trends, and much more.2024-02-1335 minLeft to Our Own DevicesLeft to Our Own DevicesJacob Combs: Securing a Product EcosystemWe sat down Jacob Combs, VP of Cybersecurity at Tandem Diabetes Care, to talk about how he manages product security at Tandem, and how he overcomes the need to secure an entire ecosystem, beyond the product's perimeters.2024-01-3024 minLeft to Our Own DevicesLeft to Our Own DevicesHenning Kruse: When OT, Network Security and Automotive MeetWe sat down with the Senior Manager for Technical Cyber Security at PwC Deutschland to discuss trends in OT security, AI, automotive cybersecurity, and everything in between.2024-01-1726 minLeft to Our Own DevicesLeft to Our Own DevicesSummarizing 2023 in Product SecurityHey hackers, defenders, and everyone in between! Today, we rewind 2023: a year of regulatory push, supply chain hacks, and enough zero days to fill a breach library. But fear not! We also saw product security rise like a phoenix, with threat modeling soaring and vulnerability management taking center stage. So buckle up as we toast the triumphs, dissect the dramas, and prepare for what's next in this ever-evolving world. 2024-01-0417 minLeft to Our Own DevicesLeft to Our Own DevicesRobert Smigelski: Where Safety and Security MeetWe sat down with Robert Smigelski, CISSP, MSEE, Manager Product Cybersecurity at B. Braun Medical, for a deep dive conversation about how he built the product security practice at B. Braun Medical, automation, and the intersection between safety and security.2023-12-1346 minLeft to Our Own DevicesLeft to Our Own DevicesGonen Barkan: Radar and CybersecurityWe sat down with the Chief Radar Officer at Arbe, who also previously led radar technology and development for General Motors, to discuss radar technology, cybersecurity and autonomous technologies.2023-11-2936 minLeft to Our Own DevicesLeft to Our Own DevicesEddy Thesee: All About Rail CybersecurityWe sat down with Eddy Thesee, a world expert in rail cybersecurity. Eddy is the Vice President of Products & Solutions Cybersecurity at Alstom, a world leader in green, smart mobility rail solutions such as rail transportation and infrastructure. Eddy began his career as a network and systems consultant and then joined Alstom where he moved through the ranks all the way to becoming the company's VP of Products & Solutions Cybersecurity.2023-11-1537 minLeft to Our Own DevicesLeft to Our Own DevicesMatanyahu Englman: The State Comptroller of Israel on CybersecurityThe brutal terrorist attack in Israel on Oct 7th against men, women, children and the elderly has left us heartbroken. We at Cybellum hold the hands of those who lost their family members and friends in such a horrific way and pray for the safe return of our hostages and soldiers. At the same time, we find it important to push forward. Our cyber adversaries, very much like the real-world ones, never stop, and it's important to keep advancing the product security community, especially in these trying times.On that note, we share our interview with Matanyahu...2023-10-3153 minLeft to Our Own DevicesLeft to Our Own DevicesHelen Negre: On Product Security, Psychology and Personal GrowthWe sat down with Helen Negre, the Chief Cybersecurity Officer for Siemens USA and the Americas CISO for Siemens Mobility, for a fascinating and candid conversation about product security, psychology, and personal growth. Helen has shared with us insights from her nontypical journey to cybersecurity leadership and provides tips for those wanting to follow a similar path.2023-10-0435 minLeft to Our Own DevicesLeft to Our Own DevicesMichal Geva: Securing OTAWe sat down with Michal Geva, General Manager, OTA and Cybersecurity at HARMAN International to discuss trends in automotive cybersecurity and OTA cybersecurity. Michal also discussed supply chain cybersecurity, EVs and provided her tips for women in cybersecurity roles.2023-09-1935 minLeft to Our Own DevicesLeft to Our Own DevicesNidhi Gani: Championing Medical Device Regulatory AffairsWe sat down with Nidhi Gani, a seasoned regulatory affairs professional with over a decade of experience in medical devices and digital health to discuss her experiences and her insights. Nidhi has worked with devices ranging from heart and lung machines to rehabilitation devices. She works at Embecta as a Regulatory Affairs Software and Cybersecurity and is a Cybersecurity Fellow at the Archimedes Center for Health Care and Medical Device Cybersecurity at Northeastern University.2023-09-0527 minLeft to Our Own DevicesLeft to Our Own DevicesMihoko Matsubara: Cybersecurity as a Global EffortThe Chief Cyber Security Strategist at NTT Japan came by our offices to discuss the differences in cybersecurity approaches between countries, her experience working with the public and the private sector, and how to manage cybersecurity and spend time at the beach at the same time.2023-08-1523 minLeft to Our Own DevicesLeft to Our Own DevicesJoanna C. Cooper: The Power of “Yes”Joanna C. Cooper is the General Manager at Daimler Truck North America. Over the past 15 years, Joanna built multi-disciplinary industry experience, domestically and internationally, ranging from project management and component procurement, through manufacturing operations and engaging customer experience. She joined us to discuss the automotive industry, cybersecurity, and how to advance women in manufacturing roles.2023-08-0227 minLeft to Our Own DevicesLeft to Our Own DevicesJohn Heldreth: Growing a 15,000 Strong Automotive Cybersecurity GroupWe sat down with the Car Security Operations at Volkswagen AG, and ASRG founder to discuss his journey into automotive cybersecurity, what he learned along the way, and why the upcoming Secure Our Street Conference is so important to the community.2023-07-1938 minLeft to Our Own DevicesLeft to Our Own DevicesBindu Sundaresan: Uncovering Business Blind Spots With CybersecurityWe sat down with the Director at AT&T Cybersecurity to discuss the relationship between cybersecurity and the business, the growing connectivity in the telecom industry, and to hear her tips and tricks for women in cybersecurity.2023-07-0544 minLeft to Our Own DevicesLeft to Our Own DevicesTony Turner: HBOMs, Threat Modeling and Supply Chain CybersecurityWe sat down with Tony Turner, CEO at Opswright, for a fascinating conversation about everything product security - from the collaboration challenge between asset owners and manufacturers to HBOMs and his new book.2023-06-2137 minLeft to Our Own DevicesLeft to Our Own DevicesKatie Boswell: When AI Meets Industrial CybersecurityWe sat down with the Managing Director, Cyber Security Services at KPMG, to discuss life on the front lines of securing the most critical national infrastructure, how AI will change security as we know it, and how her mother inspired her to become a leader in this field.2023-06-0726 minLeft to Our Own DevicesLeft to Our Own DevicesEsti Pesin: Flying Cyber (with Guest Host Michael Engstler)We sat down with Esti Peshin, VP, General Manager, Cyber Division at Israel Aerospace Industries - ELTA, and our guest host Michael Engstler, co-founder and CTO of Cybellum, to discuss what flying a plane can teach you about cybersecurity. Under Esti’s management, IAI's cyber activity was expanded from a Directorate to a Division. Esti also served as the Director General of the Israeli Hi-Tech Caucus at the Knesset, the Israeli Parliament, and was a partner in multiple private equity firms. Esti is also a licensed pilot, as shown in the fantastic videos she shares on social media.2023-05-2428 minLeft to Our Own DevicesLeft to Our Own DevicesPaul Cha: How LG VS Became CSMS CompliantPaul Cha is a cyber and product security leader, serving as the VP of Cybersecurity at LG Electronics Vehicle component Solutions. Paul held critical positions at Synopsis, Ford Motor Company, and Samsung prior to joining LG. We sat down with him to discuss LG VS' journey to becoming CSMS certified, his work with Cybellum, and learn from his many years of experience.2023-05-0919 minLeft to Our Own DevicesLeft to Our Own DevicesSlava Bronfman: Watching Product Security MatureWe sat down with the Cybellum Co-founder and CEO, to discuss the progress made in the product security world and Cybellum's transition from a tiny start-up into a global company that was bought by LG Electronics.2023-04-2626 minLeft to Our Own DevicesLeft to Our Own DevicesAdam Boulton: From Food to Embedded DevicesAdam Boulton, VP of Security Technologies at Cybellum, is one of the most experienced software security pros on the planet, with over 15 years of experience in security engineering. Among other things, he has more than 100 cybersecurity patents under his belt and is one of the leading experts in reverse engineering of device binaries in particular and product security in general. In this episode, he shares his experience and his tips on building a product security strategy and provides security lessons from the food and building industries.2023-03-2835 minLeft to Our Own DevicesLeft to Our Own DevicesMirel Sehic: Simplifying Product SecurityThe Global VP and GM of Cybersecurity at Honeywell shares his thoughts on the link between IT, OT, and Product Security, and shares how simplifying cybersecurity is key. Mirel spent over a decade embedded across varying domains, with global experience leading engineering, operations, marketing, and sales teams. He is an advisor and board member in multiple cybersecurity organizations and non-profits and is one of the trailblazers in the world of IT and OT cybersecurity.2023-03-1640 minLeft to Our Own DevicesLeft to Our Own DevicesFaye Francy: The Power of CommunityWe sat down with the Executive Director of Automotive-ISAC to discuss the power of community in the Automotive cybersecurity world and beyond. Faye has over 30 years of diverse experience in government and industry specializing in forensic chemistry, aviation, security, and networked systems. She’s a key figure in today's Automotive cybersecurity world,2023-02-2828 minLeft to Our Own DevicesLeft to Our Own DevicesAdam Shostack: Threat Modeling, Star Wars, and GamesAdam is one the biggest threat modeling experts in the world, he is an advisor, a lecturer, a game designer, and the author of multiple books, including "Threat Modeling: Designing for Security". His latest book “Threats: What Every Engineer Should Learn From Star Wars” is available now: https://www.amazon.com/Threats-Every-Engineer-Should-Learn/dp/1119895162#:~:text=In%20Threats%3A%20What%20Every%20Engineer,how%20to%20develop%20secure%20systems.During our conversation, Adam mentioned a book by Csikszenmihality, which can be found here:https://www.amazon.com/Finding-Flow-Psychology-Engagement-Everyday-ebook/dp/B086SVQ1MJ/ref=sr_1_1?crid=132R6QL2KYRZU...2023-02-1427 minLeft to Our Own DevicesLeft to Our Own DevicesPhil Englert: The Way Forward for Med Device CybersecurityPhil Englert is the Director of Medical Device Security at Health ISAC. Phil is an experienced professional well versed in building and sustaining Medical Device Cybersecurity programs in healthcare. He has held key positions at MedSec, Deloitte, and Catholic Health Initiatives. We sat down with him to discuss the challenges, trends, and outlooks in today's medical device cybersecurity world.2023-02-0130 minLeft to Our Own DevicesLeft to Our Own DevicesThomas LaRock: SolarWinds' Cybersecurity StrategyThomas is the Head Geek at SolarWinds. He has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He came to our show to talk about lessons learned from SUNBURST, as well as SolarWinds' initiatives and strategy going forward.2023-01-1726 minLeft to Our Own DevicesLeft to Our Own DevicesNew Year Special: Summarizing 2022 in Product SecurityIn the 20th episode of Left to Our Own Devices: The Product Security Podcast, hosts David Leichner and Shlomi Ashkenazy summarize the highlights and takeaways from their 19 interviews with product security leaders in 20222023-01-0313 minLeft to Our Own DevicesLeft to Our Own DevicesJoe Weiss: The Hard Truth About Industrial CybersecurityJoe Weiss is what you would call a trailblazer in the realm of critical infrastructure cybersecurity. During his 40+ years in industrial instrumentation controls and cybersecurity, he has set many of the standards we now aspire to achieve and written multiple books on cybersecurity for power stations, water stations, and data centers. He is the managing partner at Applied Control Solutions consultancy and director of the International Society for Automation. We sat down with him to discuss the frightening reality of industrial control systems. and the importance of including engineers in industrial product security.2022-12-1437 minLeft to Our Own DevicesLeft to Our Own DevicesDale Peterson: ICS Security Has a Way to GoDale Peterson is the founder of the S4 conference and creator of many of today’s standard ICS security tools and techniques. We spoke with him about the biggest challenges in industrial control system cybersecurity today and learned from his fascinating personal story.2022-11-2332 minLeft to Our Own DevicesLeft to Our Own DevicesMimi Gross: The Cybersecurity Talent CrisisMimi Gross - a.k.a the “Cybersecurity Matchmaker” -- is an expert in cybersecurity recruiting, and has helped dozens of companies find the right talents to join their teams. We sat down with her to discuss what manufacturers can learn from start-ups about recruiting top talent.2022-11-1022 minLeft to Our Own DevicesLeft to Our Own DevicesRick Driggers: From the U.S. Air Force to Industrial CybersecurityRick Driggers is the critical infrastructure cyber lead at Accenture Federal Services. We chatted with him about his incredible journey from the U.S. Air Force to CISA, and uncovered the biggest challenges facing the industrial cybersecurity world today2022-10-2625 minLeft to Our Own DevicesLeft to Our Own DevicesRonen Lago: Shifting Gears in Product SecurityRonen Lago has spent the past 20 years as CTO and Head of Product, in companies such as Daimler, Lockheed Martin, Motorola, and CYE. We sat with him to discuss why device manufacturers need to make drastic changes to their operations and hear his tips and tricks for product security teams.2022-10-1225 minLeft to Our Own DevicesLeft to Our Own DevicesDr. Suzanne Schwartz, FDA: What's Next in Medical Device CybersecurityDr. Suzanne Schwartz is the Director of the Office of Strategic Partnerships & Technology Innovation, at the Center for Devices & Radiological Health of the US FDA. She is one of the most prominent policymakers and leaders in medical device cybersecurity, having spent the past 12 years at the FDA advancing medical device cybersecurity for the benefit of the entire world. We sat down with her to discuss where medical device cybersecurity regulations are headed and hear her advice for women wanting to advance their careers in cybersecurity.2022-09-2827 minLeft to Our Own DevicesLeft to Our Own DevicesEystein Stenberg: Software Updates for Connected Devices - Everything You Wanted to KnowEystein Stenberg, Co-founder, and CTO at Northern.tech (developers of Mender), sheds some light on the intricate world of software updates for connected devices and provides his tips and tricks for product security teams.2022-09-1325 minLeft to Our Own DevicesLeft to Our Own DevicesAnthony Fernando: Surgical Robots, FDA and CybersecurityMedical Device leader and innovator Anthony Fernando discusses the future of robotic surgery, regulations, and cybersecurity.Anthony Fernando is President and CEO of Asensus Surgical, a company that is reimagining how surgeries are being done. Anthony is a veteran of the medical device industry, having held key positions at Stryker, Becton Dickinson & Company, PerkinElmer, and more.2022-08-3128 minLeft to Our Own DevicesLeft to Our Own DevicesAsaf Atzmon: The Future of Automotive CybersecurityAsaf Atzmon, the former VP & General Manager Automotive Cybersecurity at HARMAN International, sat down with us to discuss where automotive product cybersecurity is headed and explains the complexity of open-source security for car manufacturers.2022-08-1630 minLeft to Our Own DevicesLeft to Our Own DevicesKen Hoyme: Building a Medical Device Cybersecurity PracticeProduct cybersecurity expert Ken Hoyme shared with us how he built the product security practice at Boston Scientific, why he chose this profession, and gives his practical recommendations for product security teams.Ken is an expert in everything product cybersecurity and has held key positions at Boston Scientific and Honeywell. He is a senior technical leader with demonstrated capabilities to drive broad cross-functional teams to create effective solutions to complex problems, with particular emphasis on safety and security-critical, regulated industries.2022-08-0332 minLeft to Our Own DevicesLeft to Our Own DevicesJoseph Steinberg: Aliens, AI and Product SecurityThe "expert witness of cyber", Joseph Steinberg, sat down with us to discuss how AI will change cybersecurity, why the product security world has ways to go, and what aliens have to do with all of that.Joseph Steinberg is a world-renowned speaker, advisor, and expert witness talking about cybersecurity, AI, and IoT. He was ranked as one of the top cybersecurity influencers in the world, wrote numerous successful books about cybersecurity, and is instrumental in shaping the cybersecurity world as we know it.2022-07-2035 minLeft to Our Own DevicesLeft to Our Own DevicesDr. Allan Friedman: All About SBOMsWe sat down with one of the most influential cybersecurity experts in the world, to talk about SBOMs, standards, and everything in between.Dr. Allan Friedman is a Senior Advisor and Strategist at the U.S Cybersecurity and Infrastructure Security Agency (CISA). He is both a technologist and a policymaker, with more than 15 years of experience in international cybersecurity and technology policy. He is known for his ability to design, convene, and facilitate complex, multi-stakeholder policy processes, which he demonstrated more than once while leading CISA's efforts to coordinate SBOM standards around the world.2022-07-0628 minLeft to Our Own DevicesLeft to Our Own DevicesTom Alrich: VEXs and Supply Chain CybersecurityTom Alrich is a well-known independent consultant and blogger about supply chain cybersecurity and software bills of material, for electric power and other industries.We sat down with him to learn from his vast experience about supply chain security, SBOMs, VEXs, and how they all tie together.2022-06-2127 minLeft to Our Own DevicesLeft to Our Own DevicesSteve Springett: CycloneDX and the Future of SBOMsIn this fascinating interview, the CycloneDX leader gives his take on the future of CycloneDX and SBOMs, and shares tips on how product security teams should prepare themselves for what's coming2022-06-0725 minLeft to Our Own DevicesLeft to Our Own DevicesJohn Ray: Is Florida the Silicon Valley of Medical Devices?John Ray is the Executive Director of the FMMC, a Florida statewide association of medical technology firms., which aims to unite, promote and grow the Florida medical device industry, and to enhance the business success of its member companies. John sat down with us and explained why Florida is one of the greatest hubs for medical device manufacturers and reveals what he learned about medical device cybersecurity after working with dozens of medical technology companies.2022-05-2423 minLeft to Our Own DevicesLeft to Our Own DevicesChris Gates: Protecting Lives with Medical Device Cybersecurity (Part 2 of 2)Part 2 of 2.In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging -- and fascinating -- profession.During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by...2022-05-0321 minLeft to Our Own DevicesLeft to Our Own DevicesChris Gates: Protecting Lives with Medical Device Cybersecurity (Part 1 of 2)Part 1 of 2.In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging -- and fascinating -- profession.During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by...2022-04-2624 minLeft to Our Own DevicesLeft to Our Own DevicesThomas Wambera: The Automotive Ghost-WritersThomas Wambera, Affiliate Business Manager at AVL Deutschland, sheds some light on the upcoming WP. 29 regulations and talks about cybersecurity in an autonomous world.Thomas is a veteran cybersecurity expert and engineer in the automotive industry, including in areas such as controllers, autonomous cars, and regulation. 2022-04-1428 minLeft to Our Own DevicesLeft to Our Own DevicesFelipe Fernandes: Securing JaguarsFelipe Fernandes from Jaguar Land Rover (JLR) discusses the toughest challenges and most exciting innovations in today's automotive cybersecurity world and reveals what his favorite JLR car is.Felipe is a Cyber Security Manager at Jaguar Land Rover. He is an expert in all things automotive cybersecurity, from RF systems to IoT and embedded hardware design. In the past, he was Head of Vehicle Cyber Security LATAM at Fiat Chrysler.2022-04-0627 minLeft to Our Own DevicesLeft to Our Own DevicesDavid Colombo: Hacking TeslasIn the first episode of "Left to Our Own Devices", David Colombo (aka the "cyber boy wonder") breaks down how he hacked dozens of Teslas in one day, how he became a world-renowned security researcher at the age of 19, and shares his tips and tricks for product security teams.David is the founder of Colombo Technologies. He is a very prolific cyber security researcher who, despite his young age, has managed to build quite a name for himself in multiple industries. During the past few years, he's exposed critical vulnerabilities in government offices, banks, and, most recently...2022-03-2325 minLeft to Our Own DevicesLeft to Our Own DevicesIntroducing Left to Our Own Devices: The Product Security PodcastProduct security and cybersecurity pros around the world are working really hard right now to build their strategy for safeguarding devices and complying with regulations. We’ve noticed everyone’s running into the same problems, but they take different approaches. Another thing they all have in common is that they wanna learn what the other person is doing.And then it hit us - why not start a podcast?Left to Our Own Devices is the name of our new podcast. Dedicated to everything product security, from Medical SBOM, to WP. 29 and the late...2022-03-0201 min