![]() |
Threat Talks - Your Gateway to Cybersecurity InsightsThreat Talks is your cybersecurity knowledge hub. Author: Threat Talks
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure! Language: en Contact email: Get it Feed URL: Get it iTunes ID: Get it Trailer: |
Listen Now...
Maritime Cybersecurity: Predictable = Hackable
Tuesday, 13 January, 2026
You’re Port Control. A vessel requests entry.No captain. No crew. Just autonomy.In maritime cybersecurity, the risk isn’t that the ship is autonomous.It’s that you no longer know who’s steering.Lieuwe Jan Koning (Co-Founder & CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.(00:05) - No captain, just code: the Port Control dilemma (02:05:15) - Autonomous shipping is here - and it’s remote by design (06:15:48) - When it crashes: who owns the blame (and the bill)? (07:38:12) - Ready or not: why “keeping watch” breaks at sea (10:12:49) - Predictable = steerable: the risks most teams miss (13:49:46) - Visibility vs compromise: when the ship becomes a weapon (18:46:10) - The mindset shift: from castles to constant compromise (20:10:45) - Regulation gap: high impact, low control (21:45:50) - Too late? Only if you stay blind to real threats (01:50:19) - Stop splitting IT and OT: defend vessels like HQ (05:19:42) - Put it on the agenda: ask better questions, run scenarios (09:42:22) - Wrap: make it tangible, build security into autonomy Key Topics Covered• Why maritime cybersecurity now decides physical safety, not just data protection• How predictability in autonomous vessels creates exploitable maritime cyber risk• Where responsibility breaks down when humans leave the bridge• What cyber attacks on critical infrastructure look like once they reach the sea• What to do next to protect against cyber attacks at seaRelated ON2IT content & explicitly referenced resourcesBefore the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw Threat Talks: https://threat-talks.com/ON2IT (Zero Trust as a Service): https://on2it.net/AMS-IX: https://www.ams-ix.net/amsThreat Talks connects cyber threats to operational reality - every week.Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.Click here to view the episode transcript. 🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX












