Threat Talks - Your Gateway to Cybersecurity Insights

The OT Attack Cyber Kill Chain


Listen Later

Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is🌎 How OT attacks can impact whole nationsJoin Rob and Luca for a discussion on the motivations behind OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.

Additional Resources:

► Operational Technology for Dummies (Previous Episode): https://youtu.be/Pdp_OCf6npQ

► Inside Volt Typhoon: China’s Silent Cyber Threat: https://youtu.be/DSalzpj59RI

► Hack the Boat - cybersecurity on the high seas 🌊 - Threat Talks Cybersecurity Podcast: https://youtu.be/Xa0TJ3eRTCw

...more
View all episodesView all episodes
Download on the App Store

Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks