Control Loop: The OT Cybersecurity Podcast

Insight from the ISACs.


Listen Later

Multiple strains of Russian wiper malware are targeting entities in Ukraine. A high-severity command injection vulnerability affects Cisco devices. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. And US Congressman Andrew Garbarino will serve as the new Chairman of the Subcommittee on Cybersecurity and Infrastructure Protection. In Part 2 of 2 in our interview segment from Dragos’ Ask the ISACs discussion led by Dawn Cappelli, Dragos’ Head of OT-CERT, panelists Tim Chase from the MFG-ISAC, Eugene Kipniss from MS-ISAC, Jennifer Lyn Walker from Water ISAC, and Matt Duncan from E-ISAC return. In the Learning Lab, Dragos’ VP Product & Industry Market Strategy Mark Urban concludes his discussion with Lesley Carhart, Dragos’ Director of Incident Response for North America, about creating an ICS/OT specific incident response plan. 


Control Loop News Brief.Russian wiper malware targets Ukraine.

Russia’s Sandworm hackers blamed in fresh Ukraine malware attack (CyberScoop)

APT Activity Report for T3 2022 (ESET)

Cyber ​​attack on the Ukrinform information and communication system (CERT-UA)

Command injection vulnerability affects Cisco devices.

When Pwning Cisco, Persistence is Key - When Pwning Supply Chain, Cisco is Key (Trellix)

Cisco IOx Application Hosting Environment Command Injection Vulnerability (Cisco)

Congressman Andrew Garbarino to serve as Chairman of the Subcommittee on Cybersecurity and Infrastructure Protection.

Garbarino Selected To Chair Cybersecurity Subcommittee (Office of Andrew Garbarino)

IoT supply chain threatened by exploitation of Realtek Jungle SDK vulnerability.

Network Security Trends: August-October 2022 (Unit 42)

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats (Unit 42)


Control Loop Interview.

The interview is the second part from Dragos’ Ask the ISACs discussion led by Dawn Cappelli, Dragos’ Head of OT-CERT, with panelists Tim Chase from the MFG-ISAC, Eugene Kipniss from MS-ISAC, Jennifer Lyn Walker from Water ISAC, and Matt Duncan from E-ISAC. 


Control Loop Learning Lab.

In Part 2 of 2, Dragos’ VP Product & Industry Market Strategy Mark Urban speaks with Lesley Carhart, Dragos’ Director of Incident Response for North America, about creating an ICS/OT specific incident response plan. 


Control Loop OT Cybersecurity Briefing.

A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Learn more about your ad choices. Visit megaphone.fm/adchoices

...more
View all episodesView all episodes
Download on the App Store

Control Loop: The OT Cybersecurity PodcastBy N2K Networks

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

21 ratings


More shows like Control Loop: The OT Cybersecurity Podcast

View all
CyberWire Daily by N2K Networks

CyberWire Daily

1,016 Listeners

Smashing Security by Graham Cluley

Smashing Security

322 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Afternoon Cyber Tea with Ann Johnson by Microsoft

Afternoon Cyber Tea with Ann Johnson

39 Listeners

Only Malware in the Building by DISCARDED | N2K Networks

Only Malware in the Building

8 Listeners