Cybersecurity Under Pressure. Real Attacks, Real Lessons

Engineer the Path, Not Just the Perimeter


Listen Later

A vendor fixes an alarm at 4 PM. At midnight, that same remote tunnel is used to push an unsafe setpoint. Different intent, identical path.


How does your network know the difference? Spoiler: It doesn't.


This is the synthesis. We connect the dots from the previous episodes, the Oldsmar attack and the break-glass dilemma, to deliver a final verdict: You cannot patch your way to safety. You have to design it. We explore how to move from abstract frameworks like IEC 62443 to a concrete "abuse-resistant" architecture.


Tune in to learn why the most critical firewall in your plant isn't a device, it’s a design philosophy.

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Under Pressure. Real Attacks, Real LessonsBy Antonio González