Home
Categories
EXPLORE
News
Comedy
Music
Society & Culture
Education
Sports
Business
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/81/a4/1a81a48d-f587-433c-0389-45d5dbe778ce/mza_10141453975800713152.jpg/600x600bb.jpg
Cyber Brews - The Operational Technologies Podcast
Dave A. and Chris F.
13 episodes
2 weeks ago
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.
Show more...
Technology
RSS
All content for Cyber Brews - The Operational Technologies Podcast is the property of Dave A. and Chris F. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/41162623/41162623-1715178987216-b3442689931e6.jpg
Cyber Brews - The Risk & Consequence Chronicles
Cyber Brews - The Operational Technologies Podcast
56 minutes 30 seconds
1 year ago
Cyber Brews - The Risk & Consequence Chronicles

Welcome to Episode Five of Our Podcast!

In this episode, we dive into the critical topic of Risk and Consequence in the context of OT cybersecurity. Here, we share our insights on cyber risks and the potential consequences organisations face.


In This Episode, We Cover:


  • Risk Assessment Basics: We discuss the foundations of cyber risk assessments, focusing on identifying deviations from normal operations and exploring key concepts like "attack vectors" and the "kill chain."

  • Example Incident: We examine the CrowdStrike case to understand how OT risk assessments account for insider threats and unintended consequences.

  • Likelihood and Attack Types: We look at the frequency and variety of cyber threats, considering how risk changes based on the type of attacker, from disgruntled employees to bot-driven attacks.

  • Mitigation Strategies: We wrap up with a look at prevention versus mitigation, discussing ways to prioritize actions and implement these countermeasures despite the challenge of quantifying cyber risks.

Join us in exploring the complex layers of OT cybersecurity risk assessments and the real-world impacts of these measures.

Thank you for tuning in, and don’t forget to rate our podcast as we continue our journey through the world of OT cybersecurity!

Cyber Brews - The Operational Technologies Podcast
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time. Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely. This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.