allfeeds.ai

 

Threat Talks - Your Gateway to Cybersecurity Insights  

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks is your cybersecurity knowledge hub.

Author: Threat Talks

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Be a guest on this podcast

Language: en

Genres: News, Tech News

Contact email: Get it

Feed URL: Get it

iTunes ID: Get it

Trailer:


Get all podcast data

Listen Now...

Breached OT Kills. Zero Trust 2.0 Doesn’t
Tuesday, 31 March, 2026

Not long ago, OT environments were isolated islands.Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets. That world is gone.  Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine.  And this is just the start. And it changes everything about how to secure them.In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.So, what does work?Zero Trust.If your organization relies on industrial systems, this is the shift you need to understand. Timestamps00:00 – OT vs IT Security Introduction and Key Differences00:57 – IT OT Convergence Is Changing OT Security04:49 – What OT vs IT Security Looks Like in Practice10:13 – Why IT and OT Teams Struggle to Communicate12:18 – How Zero Trust Applies to OT Environments14:21 – How to Secure OT with Zero Trust and IT OT Convergence Key Topics CoveredHow OT vs IT security requires a different approach in practiceWhy IT OT convergence is increasing risk across factory environmentsHow limitations like patching and availability shape OT security decisionsHow Zero Trust segmentation can reduce risk without disrupting operationsResourcesThreat Talks: https://threat-talks.com/ ON2IT (Zero Trust as a Service): https://on2it.net/ AMS-IX: https://www.ams-ix.net/amsThreat Talks episode on Hack the Boat: https://www.youtube.com/watch?v=Xa0TJ3eRTCwBlog: Purdue vs Zero Trust in OT security https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/   Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques. 🔔 Follow and Support our channel! 🔔 === ► YOUTUBE:    / @threattalks  ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...► APPLE: https://podcasts.apple.com/us/podcast... 👕 Receive your Threat Talks T-shirthttps://threat-talks.com/ 🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com

 

We also recommend:




Ctrl-Walt-Delete
The Verge

Debrief
Bloomberg

Bli säker-podden

Graveyard Shift Gaming
Adam & Chris

Words of Tim Podcast
Tariq Monther

Fala Elisa!
Elisa nas Redes

Chukwu's Podcast
Chukwu Mira

Podcast Duo
YeramelLamsihar

Iodine Intelligence - Empowering Intelligent Care
Iodine Software

Vorstadt Podcast
Vorstadt

Your Macsimum Podcast
Macsimum News