![]() |
Threat Talks - Your Gateway to Cybersecurity InsightsThreat Talks is your cybersecurity knowledge hub. Author: Threat Talks
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure! Language: en Contact email: Get it Feed URL: Get it iTunes ID: Get it Trailer: |
Listen Now...
Breached OT Kills. Zero Trust 2.0 Doesn’t
Tuesday, 31 March, 2026
Not long ago, OT environments were isolated islands.Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets. That world is gone. Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine. And this is just the start. And it changes everything about how to secure them.In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.So, what does work?Zero Trust.If your organization relies on industrial systems, this is the shift you need to understand. Timestamps00:00 – OT vs IT Security Introduction and Key Differences00:57 – IT OT Convergence Is Changing OT Security04:49 – What OT vs IT Security Looks Like in Practice10:13 – Why IT and OT Teams Struggle to Communicate12:18 – How Zero Trust Applies to OT Environments14:21 – How to Secure OT with Zero Trust and IT OT Convergence Key Topics CoveredHow OT vs IT security requires a different approach in practiceWhy IT OT convergence is increasing risk across factory environmentsHow limitations like patching and availability shape OT security decisionsHow Zero Trust segmentation can reduce risk without disrupting operationsResourcesThreat Talks: https://threat-talks.com/ ON2IT (Zero Trust as a Service): https://on2it.net/ AMS-IX: https://www.ams-ix.net/amsThreat Talks episode on Hack the Boat: https://www.youtube.com/watch?v=Xa0TJ3eRTCwBlog: Purdue vs Zero Trust in OT security https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/ Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques. 🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: / @threattalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...► APPLE: https://podcasts.apple.com/us/podcast... 👕 Receive your Threat Talks T-shirthttps://threat-talks.com/ 🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com













