Exploited: The Cyber Truth

From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust


Listen Later

In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Cordell Robinson, CEO of Brownstone Consulting, to explore how security frameworks like NIST 800-53 are evolving from paperwork exercises into real drivers of security maturity.

From continuous monitoring and secure-by-design development to Software Bills of Materials (SBOMs) and vulnerability transparency, the conversation examines what it takes to build trust in embedded and operational technology (OT) systems, especially as regulators sharpen their focus and nation-state threats grow more sophisticated.

Together, they explore:

  • Why compliance should cover people, processes, and technology—not just policies
  • How NIST frameworks are shifting from checklists to operational rigor
  • The growing importance of SBOMs in supply chain transparency
  • How AI is reshaping both cyber defense and attacker capability
  • What new regulatory pressure (including the EU Cyber Resilience Act) means for manufacturers

Whether you build embedded systems, ship software to government agencies, or manage critical infrastructure, this episode offers practical insight into building compliance programs that strengthen security and earn trust.

...more
View all episodesView all episodes
Download on the App Store

Exploited: The Cyber TruthBy RunSafe Security