Joe Bates is a member of the Bad River Band, a Native American Tribe residing along Lake Superior in Wisconsin. He and his community have been embroiled in a long-standing legal and public relations battle against Enbridge, a Canadian energy company, to protect their ancestral lands. This struggle has been documented in "Bad River," a documentary film released in early 2024, which showcases Bates and his fellow activists within the band. Joe joins Jay to share his personal journey of activism, the profound influence of past generations of tribal and environmental activists on his own path, and the ongoing fight against Enbridge, which affects the future of water protection in America. To learn more about the Bad River Band, click here. Episode Chapters (00:00) - Intro (01:19) - Joe’s activist history (04:31) - The connection between the Bad River Band and their land (10:06) - How did Enbridge come to have pipes under native land against the Bad River Band’s wishes? (14:00) - The threat’s Enbridge’s Line 5 poses to the environment (18:10) - “You can’t put a price tag on what we have. What we have is priceless.” (19:23) - Joe and Jay discuss the documentary “Bad River” (22:58) - Thank you and goodbye For video episodes, watch on www.youtube.com/@therudermanfamilyfoundation Stay in touch: X: @JayRuderman | @RudermanFdn LinkedIn: Jay Ruderman | Ruderman Family Foundation Instagram: All About Change Podcast | Ruderman Family Foundation To learn more about the podcast, visit https://allaboutchangepodcast.com/…
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join John Vecchi as he speaks with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security and threats in an increasingly Thing-based world. Join us on the IoT Security Podcast, powered by Phosphorus Cybersecurity. https://phosphorus.io/
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join John Vecchi as he speaks with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security and threats in an increasingly Thing-based world. Join us on the IoT Security Podcast, powered by Phosphorus Cybersecurity. https://phosphorus.io/
What did 2024 teach us about securing the IoT and OT landscape? In this special 2024 lookback episode, Alex Nehmy, Asia Pacific CTO at Phosphorus, revisits impactful moments from industry experts and IoT Security Podcast guests, including Jason Taule, Patrick Gillespie, Sean Tufts, Michael Lester, Joel Goins, Khris Woodring, Mike Holcomb, and John Threat who share their unique journeys and lessons-learned in the realm of IoT security and beyond. Reflecting on learnings from 2024 and looking ahead at 2025, the discussion spans... • Why remediation beats endless assessments in IoT security. • Overcoming challenges with legacy systems and device management. • Trends shaping the future of Cyber-Physical Systems. • The power of community in tackling cybersecurity risks. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
In this episode, host and xIoT security evangelist John Vecchi sits down with Enrique Martinez, OT/IoT Practice Lead at World Wide Technology (WWT), to explore the critical challenges and solutions in securing OT and IoT environments. Enrique shares his journey into cybersecurity, highlights the importance of asset visibility, and discusses how AI is transforming both defense and risk in the cyber-physical world. Key Topics Covered: The foundational importance of asset awareness and behavior analysis. How IT/OT convergence increases vulnerabilities and the need for layered security. Challenges in securing legacy systems and balancing risk with safety. How AI can enhance data analytics, decision-making, and security in OT. Practical insights on remediation and accelerating asset discovery. Featured Insights: “It all starts with asset awareness—knowing what you have and how it behaves is the first step to securing it.” “AI offers great potential for security, but with cyber-physical systems, safety and availability must always come first.” Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
In this episode, Mark Mattei, Global Director of Industrial Managed Security Services at 1898 & Company, unpacks the high-stakes challenges of protecting vital systems from sophisticated attacks. Host John Vecchi highlights the critical issues surrounding IoT and OT security within industrial critical infrastructure. From the importance of cybersecurity in industrial environments to the practical challenges of compliance and regulation and strategies for mitigating cybersecurity threats without compromising operational integrity, Mark shares key insights and actionable advice for operators in today’s volatile security landscape. Listeners of this episode will hear about... The Growing Complexity of OT and IT Security Needs : Mark discusses the increasing sophistication of threats targeting critical infrastructure, including state-sponsored attacks and ransomware, and the complexities operators face in balancing security needs with uninterrupted operations. Challenges with Compliance and Budget Constraints : Critical infrastructure operators often face budgetary and regulatory challenges that limit their ability to invest in cybersecurity. Navigating mandates like NERC CIP and adapting to regulatory changes is essential but can detract from proactive security efforts. Building a Supportive Community : Mark encourages operators to reach out within the OT security community for advice and support. With limited experts in this field, sharing knowledge and collaborating can make a significant difference for smaller utilities and organizations facing resource constraints. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Emphasizing the importance of collaboration and communication, Mike Holcomb shares his extensive experience and practical insights into securing ICS and IoT environments. Holcomb, ICS/OT cybersecurity global lead at Fluor, stresses mastering basic cybersecurity fundamentals and asset inventory, along with the nuances of integrating IT and OT security. The episode aims to bridge gaps between IT and OT teams to fortify defenses against sophisticated cyber threats. Listeners will gain valuable insights into critical takeaways, including: Real-World Impact of Cyber Attacks : Mike explains how high-profile incidents, such as Colonial Pipeline and Triton, highlighted the physical consequences of cyber threats, making clear that OT security is a top priority for critical infrastructure. Bridging the IT-OT Divide : The discussion underscores the need for IT and OT teams to collaborate, as a lack of communication and understanding can leave vulnerabilities open to exploitation. Achievable Defense Strategies : From basic network segmentation to secure remote access, Mike provides practical, accessible steps to strengthen ICS/OT security without overwhelming smaller teams. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Recent years have seen a growing awareness of the vulnerabilities in our critical infrastructure to cyberattacks, particularly from nation-states like Russia, Iran, and China. In this episode of the IoT Security Podcast , host John Vecchi welcomes Khris Woodring, Senior Cybersecurity Architect at Syngenta, to explore the evolving challenges and opportunities in securing critical infrastructure. From his serendipitous journey into the field to actionable insights on workforce development, Khris shares how industries can overcome the persistent talent gap and drive proactive change in OT security. Key topics include: The unique challenges of bridging IT and OT security. Why workforce shortages hinder progress and how industry and academia can collaborate. The importance of standardizing roles, frameworks, and terminology. Stories of how early curiosity sparked a career in cybersecurity. Tune in for a passionate discussion on how to protect the systems that make modern life possible—and the steps we can take to secure a resilient future. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Businesses and government organizations have seen threats to critical US infrastructure on the rise in recent years, particularly within IoT and OT systems, posed by cyberattacks, notably from state actors like Iran. With that context, Joel Goins, a veteran of manufacturing, oil and gas, and OT security at large, talks with John Vecchi about the critical need for enhanced security measures for data centers and other vital components, the vulnerabilities present in IoT devices, and the essential steps companies must take to safeguard against both traditional and emerging cyber threats. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Explore the intricate challenges and solutions in managing OT cybersecurity, particularly emphasizing the importance of active querying over passive deep packet inspection, with Michael Lester, Senior Product Security Engineer at Rockwell Automation! Lester underscores the necessity of segmenting networks, improving visibility, and fostering collaboration between IT and OT teams to mitigate risks and enhance security. His journey, from passionate mentorship to pursuing a PhD, exemplifies a commitment to advancing industrial cybersecurity frameworks and education. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and healthcare. With insights from Patrick Gillespie, an OT expert at GuidePoint Security, we'll discuss the convergence of IT and OT systems, the risks introduced by COVID-19, and the advanced solutions from providers like Phosphorus that are combatting these threats. Patrick also sheds light on his personal journey from military service to a cybersecurity career, and the essential steps organizations should take to bolster their OT security, from embracing cyber hygiene to implementing robust security programs. Join us as we uncover the pressing issues facing IoT security today and how innovations are driving a safer, more secure operational environment. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO Jason Taule, who brings a wealth of experience and insights from his diverse career in the field as one of the first CISOs...ever. From working with federal agencies like NASA to serving as a virtual CISO for agriculture, heavy manufacturing, and healthcare organizations, Jason offers valuable perspectives on the unique security challenges faced across different sectors. Throughout the episode, Jason discusses the evolving role of the Chief Information Security Officer (CISO) in various industries. He highlights the intricacies of implementing cybersecurity measures in sectors like healthcare, where specific jargon and risks come into play. The conversation also goes into the complexities of managing operational technology (OT) and IoT security, emphasizing the need for improved third-party access control and a better understanding of firmware vulnerabilities. Additionally, the episode explores the impact of regulations, financial pressure, and the evolving threat landscape on organizations' engagement with security. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Sean Tufts is in the house, and we ask him to go all the way back. All the way. From his origins to the evolving challenges and security needs in IoT and OT environments, particularly in critical infrastructure. Your hosts, Brian Contos and John Vecchi, engage in a thought-provoking conversation with special guest Sean Tufts from Optiv. The discussion goes into Tufts' background, from his transition from an NFL player to a cybersecurity and critical infrastructure expert, to managing substantial programs at Optiv. Sean touches on the changing landscape of critical infrastructure, the challenges of IoT and OT security in the wake of COVID-19, and the evolving tactics in cyber attacks. He also shares insightful anonymized stories of cyber incidents, emphasizing the importance of effectively addressing vulnerabilities in IoT devices and legacy systems to mitigate risks. After listening to the episode, be sure to subscribe to the Phosphorus IoT Security Podcast to stay updated on evolving cybersecurity challenges and strategies in the IoT and OT space. Share this impactful episode with colleagues and peers involved in securing critical infrastructure to spark insightful conversations and proactive measures for vulnerability management. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Content Warning: This episode contains explicit language and references to criminal activity. In this episode, Brian and John are joined by a very special guest—John Threat, also known as John Lee, a veteran of the Great Hacker War and known as "Corrupt" from the early 90s hacking group MOD (Masters of Deception). We dive into the fascinating origins and culture of hacking, with John Threat sharing his experiences from the '80s all the way to the present day and the excitement of exploring and breaking into systems. The discussion also explores the evolution and loss of excitement in the hacking culture, the potential impact of AI and machine learning, and the changing threat landscape. From the deep camaraderie within hacking groups and the diversity of the MOD team in the 90s to the potential ethical and legal implications of new technologies, this episode is set to be a thought-provoking and riveting journey into the world of cybersecurity and hacking. You can follow John Threat on Instagram at @johnthreat or follow his work at http://www.rip.space and http://www.johnthreat.com . Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
She's no slacker. Danielle Jablanski has been an "expert" — she hates that word — in nuclear policy analysis (the "original Cyber-Physical System"), energy research, and now Nozomi Networks, where she plays the crucial OT cybersecurity strategist role. John Vecchi and Brian Contos pick Danielle's brain on the ever- and never-changing trends and challenges, digging into the need for consequence-based security and collaboration between security professionals and OT engineers. The discussion also covers the growing concern about the security of IoT devices in OT environments, the importance of centralizing and managing security, addressing the issues surrounding legacy devices, and the evolving landscape of liability and insurance in cybersecurity. Key Topics Covered: 1. Trends in cybersecurity and the importance of consequence-based security 2. Concerns about the security of IoT devices in OT environments and the role of centralization and management 3. Challenges with legacy devices in ICS and healthcare and the need for building controls and defense-in-depth 4. Evolving conversations about liability and insurance in cybersecurity After tuning in to this episode, subscribe to the IoT Security Podcast, powered by Phosphorus, to stay informed about the latest trends and insights in IoT security. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security. Susan Peterson Sturm has dedicated most of her career to the energy industry, where her expertise lies in asset optimization and energy market trading. However, it was her venture into product management that led her to the exciting field of OT security. Susan's journey in the industry spans approximately 15 years, and she feels privileged to have witnessed the growth and evolution of her peers throughout this time. In this episode, Susan, Brian, and John emphasize the need for change management, localization in factories, and the integration of cybersecurity measures into existing processes. The episode also touches on the challenges faced by CISOs, the importance of user feedback, and the need to quantify material cybersecurity risk. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
Find the line between man and machine with John, Brian, and guest Len Noe, CyberArk technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to a number of augmentations himself, is a self-taught cybersecurity expert with a unique background in the world of black hat and gray hat hacking. For most of his life, Len delved into the dark side of technology, breaking into computers and causing havoc. However, with the arrival of grandchildren, Len realized that he needed to change his ways. Recognizing that his skills were primarily focused on hacking, Len made the brave decision to use his expertise for good. He embarked on a new journey, putting his unique perspective on security to work for the good guys. Len transitioned from being a malicious hacker to becoming a cybersecurity professional, using his knowledge to defend against cyber threats and secure computer systems. Len shares his experiences and insights as someone who has embraced technological enhancements and implanted various devices in his own body. From RFID NFC chips to a mini-computer in their leg, Len takes us on a journey through the possibilities and challenges of this emerging field. Join us as we explore transhumanism's societal, theological, technological, moral, and medical implications. Get ready to dive deep into the possibilities of collaboration, the debates surrounding free will, and the potential benefits and drawbacks of these advanced technologies. Stay informed and open-minded about the advancements in technology and their potential impact on humanity. Share this episode with others to spark discussions on transhumanism, IoT security, and the future of technology. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced stage coaches to the security today, there's a focus on the physical. In today's episode, John and Brian talk to Patrick Benoit about people and Things. People are the solution as well as the problem, as Patrick declares that breaches only happen for two reasons. Someone did something they were supposed to do, or someone didn’t do something they were supposed to do. There’s always a human component. Listen in as they hit on topics like: The evolving landscape of integrated security platforms and the importance of trust in team dynamics The challenges of breach reporting and materiality The rising threat of ransomware attacks on IoT devices The fascinating potential of Generative AI for hackers And more on zero trust, IoT security standardization, and the role of CISOs Get ready for an information-packed episode that will illuminate the complexities and opportunities in the world of IoT security. Let’s connect about IoT Security! Follow John Vecchi at https://www.linkedin.com/in/johnvecchi The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast…
プレーヤーFMへようこそ!
Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。