
Sign up to save your podcasts
Or
Welcome to Episode Five of Our Podcast!
In this episode, we dive into the critical topic of Risk and Consequence in the context of OT cybersecurity. Here, we share our insights on cyber risks and the potential consequences organisations face.
In This Episode, We Cover:
Risk Assessment Basics: We discuss the foundations of cyber risk assessments, focusing on identifying deviations from normal operations and exploring key concepts like "attack vectors" and the "kill chain."
Example Incident: We examine the CrowdStrike case to understand how OT risk assessments account for insider threats and unintended consequences.
Likelihood and Attack Types: We look at the frequency and variety of cyber threats, considering how risk changes based on the type of attacker, from disgruntled employees to bot-driven attacks.
Mitigation Strategies: We wrap up with a look at prevention versus mitigation, discussing ways to prioritize actions and implement these countermeasures despite the challenge of quantifying cyber risks.
Join us in exploring the complex layers of OT cybersecurity risk assessments and the real-world impacts of these measures.
Thank you for tuning in, and don’t forget to rate our podcast as we continue our journey through the world of OT cybersecurity!
Welcome to Episode Five of Our Podcast!
In this episode, we dive into the critical topic of Risk and Consequence in the context of OT cybersecurity. Here, we share our insights on cyber risks and the potential consequences organisations face.
In This Episode, We Cover:
Risk Assessment Basics: We discuss the foundations of cyber risk assessments, focusing on identifying deviations from normal operations and exploring key concepts like "attack vectors" and the "kill chain."
Example Incident: We examine the CrowdStrike case to understand how OT risk assessments account for insider threats and unintended consequences.
Likelihood and Attack Types: We look at the frequency and variety of cyber threats, considering how risk changes based on the type of attacker, from disgruntled employees to bot-driven attacks.
Mitigation Strategies: We wrap up with a look at prevention versus mitigation, discussing ways to prioritize actions and implement these countermeasures despite the challenge of quantifying cyber risks.
Join us in exploring the complex layers of OT cybersecurity risk assessments and the real-world impacts of these measures.
Thank you for tuning in, and don’t forget to rate our podcast as we continue our journey through the world of OT cybersecurity!