Threat Talks - Your Gateway to Cybersecurity Insights

Looking Back at 2025: Cybersecurity at a Turning Point


Listen Later

2025 was the year detection stopped being enough.
Because attacks stopped behaving the way detection was built to handle.

OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late.
In this special end-of-year Threat Talks episode, Lieuwe Jan Koning is joined by Luca Cipriano, Yuri Wit, and Rob Maas, all in ugly Christmas sweaters, to unpack why the cybersecurity trends of 2025 represent a structural break, not a gradual evolution.
They trace how attackers scaled faster than defenders, why SOC automation became unavoidable, and how preemptive security and Zero Trust execution are emerging as the only way to regain control.
This isn’t a recap for curiosity.
It’s a map of how we got here - and what must change in 2026 to stay ahead.

  • (00:00) - Introduction: why 2025 felt fundamentally different
  • (01:31) - - 05:12 The threat landscape shifts: OT security and real-world impact
  • (05:12) - - 07:27 A new normal: how AI changed daily security work
  • (07:27) - - 09:31 The most surprising attacks of 2025
  • (09:31) - - 20:00 Inside the SOC: scale, speed, and analyst fatigue
  • (20:00) - - 22:15 “There are protections against AI… right?”
  • (22:15) - - 20:23 Zero Trust redefined: can it handle AI-driven attacks?
  • (30:23) - - 32:04 Why prevention matters more than ever
  • (32:04) - - 41:06 Looking ahead: predictions for cybersecurity in 2026

  • Key Topics Covered
    • How AI-powered attacks and autonomous malware altered attacker economics
    • Why OT security and critical infrastructure moved to the front line
    • Where SOC automation helps - and where it creates false confidence
    • Why preemptive security and Zero Trust shift defense from reaction to control

    Related ON2IT Content & Referenced Resources
    I-Soon episode
    https://www.youtube.com/watch?v=Rkp4OWOcCeU&t=1s

    Salesloft supply chain attack episode
    https://www.youtube.com/watch?v=_asJ2AN7cbA

    PromptLock malware episode
    https://www.youtube.com/watch?v=lKcUwLPBC8k

    MCP security episode
    https://www.youtube.com/watch?v=IkV6jkuYz5g

    Zero Trust episodes playlist
    https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g

    Zero Trust infographic (PDF)
    https://on2it.s3.us-east-1.amazonaws.com/250429_Infographic_ZT.pdf

    Threat Talks is built for CISOs and security leaders navigating real trade-offs—not vendor promises.
    Subscribe for grounded insight on Zero Trust execution, AI-driven threats, SOC automation, and preemptive security from practitioners in the field.

    Click here to view the episode transcript.


    🔔 Follow and Support our channel! 🔔
    === 
    ► YOUTUBE: https://youtube.com/@ThreatTalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    👕 Receive your Threat Talks T-shirt
    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️
    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    ...more
    View all episodesView all episodes
    Download on the App Store

    Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks