Go offline with the Player FM app!
DMZs, Alarm Floods and Prepping for 'What If?'
Manage episode 414803144 series 3352216
The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.
The origins of what we talk about here on Security Breach can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity. What is most interesting is that the first hacks of industrial control systems occurred at water treatment facilities, oil and gas pipelines and energy plants.
These targets were chosen because they simultaneously provided great visibility, heightened social impact, and, most notably, easily exploitable vulnerabilities. In most cases, these attacks allowed the hackers to accomplish all of their early financial and self-promotional goals, along with longer-term benefits that we’re all dealing with now – how to successfully probe the ICS.
John Cusimano, VP of OT Security at Armexa is our guest for this episode. He's seen hackers apply these lessons learned about the industrial control system first-hand, and has some interesting thoughts on the current threat landscape, as well as solutions for keeping your systems secure. Watch/listen as we discuss:
- How he transitioned from a safety and automation engineer to a career in OT cybersecurity.
- The benefits of failing in a safe manner.
- The new dangers of remote monitoring.
- Ways to implement application safe listing.
- Always being prepared to answer the 'what if?' question.
- Micro-segmentation and DMZ strategies.
- Best practices for patching and avoiding alarm floods.
- Why his biggest concern lies in a large-scale, coordinate attack on the ICS.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chapters
1. DMZs, Alarm Floods and Prepping for 'What If?' (00:00:00)
2. [Ad] Promoguy Talk Pills (00:23:49)
3. (Cont.) DMZs, Alarm Floods and Prepping for 'What If?' (00:24:22)
132 episodes
Manage episode 414803144 series 3352216
The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.
The origins of what we talk about here on Security Breach can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity. What is most interesting is that the first hacks of industrial control systems occurred at water treatment facilities, oil and gas pipelines and energy plants.
These targets were chosen because they simultaneously provided great visibility, heightened social impact, and, most notably, easily exploitable vulnerabilities. In most cases, these attacks allowed the hackers to accomplish all of their early financial and self-promotional goals, along with longer-term benefits that we’re all dealing with now – how to successfully probe the ICS.
John Cusimano, VP of OT Security at Armexa is our guest for this episode. He's seen hackers apply these lessons learned about the industrial control system first-hand, and has some interesting thoughts on the current threat landscape, as well as solutions for keeping your systems secure. Watch/listen as we discuss:
- How he transitioned from a safety and automation engineer to a career in OT cybersecurity.
- The benefits of failing in a safe manner.
- The new dangers of remote monitoring.
- Ways to implement application safe listing.
- Always being prepared to answer the 'what if?' question.
- Micro-segmentation and DMZ strategies.
- Best practices for patching and avoiding alarm floods.
- Why his biggest concern lies in a large-scale, coordinate attack on the ICS.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chapters
1. DMZs, Alarm Floods and Prepping for 'What If?' (00:00:00)
2. [Ad] Promoguy Talk Pills (00:23:49)
3. (Cont.) DMZs, Alarm Floods and Prepping for 'What If?' (00:24:22)
132 episodes
Semua episode
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.