
Kam Chumley-Soltani
Director of OT Solutions Engineering at Armis with expertise in operational technology, critical infrastructure security, and OT/IT convergence; provides technical guidance on visibility, monitoring, and threat mitigation.
Top 3 podcasts with Kam Chumley-Soltani
Ranked by the Snipd community

6 snips
Nov 17, 2025 • 28min
The Unseen World
In this engaging discussion, Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis, dives into the complex world of operational technology security. He highlights the alarming surge in cyberattacks targeting critical infrastructure by 2025 and emphasizes the necessity of device visibility to thwart these threats. Using analogies from Stranger Things, Kam explains the concept of attack paths and how AI is reshaping adversarial tactics. The importance of collaboration and continuous monitoring is underscored as essential strategies for proactive defense.

Dec 3, 2025 • 28min
The Unseen World [Cyber Things]
In this engaging conversation, Kam Chumley-Soltani, the Director of OT Solutions Engineering at Armis, shares invaluable insights into operational technology and critical infrastructure security. He delves into the importance of visibility in cyber defense and how unseen devices can become attack pivot points. Kam also highlights the role of AI in accelerating adversarial tactics and stresses the need for collaboration between IT and OT teams. Tune in to discover effective strategies for mitigating invisible threats in our increasingly connected world.

Nov 18, 2025 • 26min
Cyber Things, EP01: The Unseen World with Kam Chumley-Soltani
In this engaging discussion, Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis, dives deep into the intricate world of cybersecurity. He highlights the escalating threats to critical infrastructure and the importance of visibility in operational technology. Kam explains how connected devices create vulnerabilities and how attackers exploit them. He emphasizes practical steps for organizations, the role of AI in threats, and the necessity of collaboration in incident response. Discover how to defend against hidden digital threats!


