Listen "The OT Attack Cyber Kill Chain"
Episode Synopsis
Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is🌎 How OT attacks can impact whole nationsJoin Rob and Luca for a discussion on the motivations behind OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.Additional Resources:► Operational Technology for Dummies (Previous Episode): https://youtu.be/Pdp_OCf6npQ► Inside Volt Typhoon: China’s Silent Cyber Threat: https://youtu.be/DSalzpj59RI► Hack the Boat - cybersecurity on the high seas 🌊 - Threat Talks Cybersecurity Podcast: https://youtu.be/Xa0TJ3eRTCw
More episodes of the podcast Threat Talks - Your Gateway to Cybersecurity Insights
WSUS RCE: Update Weaponized
16/12/2025
From Hacker to Hero
03/12/2025
The Npm Worm Outbreak
25/11/2025
Inside the SalesLoft Breach
18/11/2025
The Secret Diplomats Fighting Cyber Wars
04/11/2025
Patch Smarter, Not Harder
28/10/2025
Why Your Cyber Hygiene Matters?
14/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.