Archive

All entries

On this episode of the Nexus Podcast, Michael Pyle, Director of Product Cybersecurity at Schneider Electric (SE), joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to internet facing OT and industrial control systems (ICS) that are insecurely connected to the internet.
Operational Technology
Operational Resilience
Risk Management
Cyber Resilience
Industrial
Vulnerability Management

Nexus Podcast: Michael Pyle on Securing Internet-Facing OT, ICS Assets

Michael Mimoso
gus.jpg
Industrial
Cyber Resilience
Vulnerability Management
Operational Technology
Operational Resilience

Nexus Podcast: Gus Serino on the Efforts of a Massachusetts Water Cybersecurity Collaborative

Michael Mimoso
Data centers have been targeted for kinetic attacks during the ongoing Iran war, and given their strategic prioritization during the conflict, they could be targeted for cyberattacks as well. Nexus contributor James LaBonty explains the risk and potential vulnerabilities, including building management systems and other cyber-physical systems.
Cyber Resilience
Operational Technology
Risk Management
Vulnerability Management
Operational Resilience
Industrial

Protecting Physical, Digital Security of Data Centers During Conflict

Jim LaBonty
ricci-s4pod.jpeg
Vulnerability Management
Operational Technology
Operational Resilience
Cyber Resilience
Industrial

Nexus Podcast: Dan Ricci on Four Years of the ICS Advisory Project

Michael Mimoso
nexus_stifel-offensive-sec.jpg
Risk Management
Operational Resilience
Cyber Resilience
Federal
Healthcare
Industrial

Imminent National Cyber Strategy May Lean on Offense at the Expense of Defense

Megan Stifel
In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
OT cybersecurity expert Dan Ricci writes about what OT asset management and visibility can reveal about an industrial environments, including the surfacing of risk signals, exposure of hidden dependencies, and insight about the efficacy virtual network segmentation policies and practices.
Industrial
Operational Resilience
Operational Technology
Cyber Resilience
Risk Management

From OT Asset Management to Insight: Turning Visibility Into Something That Matters

Dan Ricci
Cybersecurity experts identify five trends that leaders responsible for cyber-physical systems protection programs and OT security must strategize around.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

5 Trends Driving OT Security in 2026: From State-Sponsored Attacks to AI-Powered Threats

George V. Hulme
David Ruzicka, OT Security Director at Clarios, a top manufacturing organization, explains why it’s important for enterprises integrating and converging IT and OT to involve engineers and asset operators in cybersecurity strategy. Ruzicka explains the advantages engineers can introduce into this integration, and how a collaborative approach secures the shop floor and brings value to the business.
Operational Resilience
Operational Technology
Industrial
Nexus Conference

David Ruzicka on Bridging the Gap Between Engineers and Security

David Ruzicka, OT Security Director at Clarios, a top manufacturing organization, explains why it’s important for enterprises integrating and converging IT and…
Michael Mimoso
IT cybersecurity teams inheriting operational technology security and cyber-physical systems protection programs often come into these situations with competing incentives. This dynamic creates gaps in protecting OT and CPS that must be assessed and addressed.
Risk Management
Operational Resilience
Industrial
Operational Technology
Cyber Resilience

Competing Incentives Create IT/OT Security Gaps

Jon Holzbauer
nexus_secure-by-design-labonty-1731623724.jpg
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management

Nexus Reflections and Predictions: Jim LaBonty

Jim LaBonty
Jay C. Catherine, a security architect for a major retailer, joins the Nexus Podcast to discuss best practices for logistics cybersecurity within the retail space. This includes securing not only distribution, but also the operational technology involved in these manufacturing processes.
Industrial
Internet of Things
Cyber Resilience
Operational Resilience
Operational Technology

Nexus Podcast: Jay Catherine on Securing Logistics, OT in Retail

Michael Mimoso
Latest on Nexus Podcast