.png)
This NexusCon 2025 presentation features Michael MacMahon, Director of Intelligent Building Studio at Newcomb & Boyd, sharing real cybersecurity incidents he’s personally encountered across healthcare, higher ed, and commercial real estate. Rather than abstract risk models, Mike walks through what actually happens when building systems are exposed—how attackers get in, what they touch first, and how easily everyday convenience turns into operational failure. The stories span BAS, access control, Wi-Fi, and OT networks, all grounded in projects he’s been called into after something went wrong. The throughline is simple: these weren’t sophisticated attacks—they were predictable outcomes of poor cyber hygiene.
Inside the paywall, Mike breaks down the specific tactics used, from insecure protocols and default credentials to physical access exploits most teams never think about. You’ll hear why “air-gapped” systems still get compromised, how attackers sit quietly and observe before acting, and what the downstream consequences looked like when systems failed—lost tenants, legal exposure, operational downtime, and life-safety risk. He also explains what actually would have stopped these incidents, and why monitoring and ownership matter more than buying another tool. If you manage or design connected buildings, this recording helps you recognize the warning signs before they become your own horror story.
Watch the full recording inside Nexus Pro →
This NexusCon 2025 presentation features Michael MacMahon, Director of Intelligent Building Studio at Newcomb & Boyd, sharing real cybersecurity incidents he’s personally encountered across healthcare, higher ed, and commercial real estate. Rather than abstract risk models, Mike walks through what actually happens when building systems are exposed—how attackers get in, what they touch first, and how easily everyday convenience turns into operational failure. The stories span BAS, access control, Wi-Fi, and OT networks, all grounded in projects he’s been called into after something went wrong. The throughline is simple: these weren’t sophisticated attacks—they were predictable outcomes of poor cyber hygiene.
Inside the paywall, Mike breaks down the specific tactics used, from insecure protocols and default credentials to physical access exploits most teams never think about. You’ll hear why “air-gapped” systems still get compromised, how attackers sit quietly and observe before acting, and what the downstream consequences looked like when systems failed—lost tenants, legal exposure, operational downtime, and life-safety risk. He also explains what actually would have stopped these incidents, and why monitoring and ownership matter more than buying another tool. If you manage or design connected buildings, this recording helps you recognize the warning signs before they become your own horror story.
Watch the full recording inside Nexus Pro →

Head over to Nexus Connect and see what’s new in the community. Don’t forget to check out the latest member-only events.
Go to Nexus ConnectJoin Nexus Pro and get full access including invite-only member gatherings, access to the community chatroom Nexus Connect, networking opportunities, and deep dive essays.
Sign Up
This is a great piece!
I agree.