Threat Talks - Your Gateway to Cybersecurity Insights

Breached OT Kills. Zero Trust 2.0 Doesn’t


Listen Later

Not long ago, OT environments were isolated islands.

Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets.

 

That world is gone. 

 

Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine. 

 

And this is just the start. 

And it changes everything about how to secure them.

In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.

Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.

So, what does work?
Zero Trust.


If your organization relies on industrial systems, this is the shift you need to understand.

 

Timestamps

00:00 – OT vs IT Security Introduction and Key Differences

00:57 – IT OT Convergence Is Changing OT Security

04:49 – What OT vs IT Security Looks Like in Practice

10:13 – Why IT and OT Teams Struggle to Communicate

12:18 – How Zero Trust Applies to OT Environments

14:21 – How to Secure OT with Zero Trust and IT OT Convergence

 

Key Topics Covered

  • How OT vs IT security requires a different approach in practice
  • Why IT OT convergence is increasing risk across factory environments
  • How limitations like patching and availability shape OT security decisions
  • How Zero Trust segmentation can reduce risk without disrupting operations

Resources

  • Threat Talks: https://threat-talks.com/ 
  • ON2IT (Zero Trust as a Service): https://on2it.net/ 
  • AMS-IX: https://www.ams-ix.net/ams
  • Threat Talks episode on Hack the Boat: https://www.youtube.com/watch?v=Xa0TJ3eRTCw
  • Blog: Purdue vs Zero Trust in OT security https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/   

Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

 

🔔 Follow and Support our channel! 🔔


 === 


► YOUTUBE:    / @threattalks  

► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

► APPLE: https://podcasts.apple.com/us/podcast...

 

👕 Receive your Threat Talks T-shirt

https://threat-talks.com/

 

🗺️ Explore the Hack's Route in Detail 🗺️

https://threat-talks.com

...more
View all episodesView all episodes
Download on the App Store

Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks