Threat Talks - Your Gateway to Cybersecurity Insights

Maritime Cybersecurity: Predictable = Hackable


Listen Later

You’re Port Control. A vessel requests entry.
No captain. No crew. Just autonomy.

In maritime cybersecurity, the risk isn’t that the ship is autonomous.
It’s that you no longer know who’s steering.

Lieuwe Jan Koning (Co-Founder & CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.

  • (00:05) - No captain, just code: the Port Control dilemma
  • (02:05:15) - Autonomous shipping is here - and it’s remote by design
  • (06:15:48) - When it crashes: who owns the blame (and the bill)?
  • (07:38:12) - Ready or not: why “keeping watch” breaks at sea
  • (10:12:49) - Predictable = steerable: the risks most teams miss
  • (13:49:46) - Visibility vs compromise: when the ship becomes a weapon
  • (18:46:10) - The mindset shift: from castles to constant compromise
  • (20:10:45) - Regulation gap: high impact, low control
  • (21:45:50) - Too late? Only if you stay blind to real threats
  • (01:50:19) - Stop splitting IT and OT: defend vessels like HQ
  • (05:19:42) - Put it on the agenda: ask better questions, run scenarios
  • (09:42:22) - Wrap: make it tangible, build security into autonomy

  • Key Topics Covered
    • Why maritime cybersecurity now decides physical safety, not just data protection
    • How predictability in autonomous vessels creates exploitable maritime cyber risk
    • Where responsibility breaks down when humans leave the bridge
    • What cyber attacks on critical infrastructure look like once they reach the sea
    • What to do next to protect against cyber attacks at sea

    Related ON2IT content & explicitly referenced resources
    Before the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo 
    Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw 
    Threat Talks: https://threat-talks.com/
    ON2IT (Zero Trust as a Service): https://on2it.net/
    AMS-IX: https://www.ams-ix.net/ams

    Threat Talks connects cyber threats to operational reality - every week.
    Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.

    Click here to view the episode transcript.


    🔔 Follow and Support our channel! 🔔
    === 
    ► YOUTUBE: https://youtube.com/@ThreatTalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    👕 Receive your Threat Talks T-shirt
    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️
    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    ...more
    View all episodesView all episodes
    Download on the App Store

    Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks