
Sign up to save your podcasts
Or


While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch, managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.
By Anton Shipulin / Listen Notes4.5
88 ratings
While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch, managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.

78,352 Listeners

2,002 Listeners

370 Listeners

375 Listeners

637 Listeners

1,016 Listeners

31 Listeners

322 Listeners

112,467 Listeners

8,010 Listeners

175 Listeners

314 Listeners

114 Listeners

134 Listeners