Cyber Brews - The Operational Technologies Podcast
Dave A. and Chris F.
Cyber Brews looks to take the topic of cyber security in the ICS and Operational technologies domain and break it down into sizable chunks.
Each episode we wi...
Series 2 - Episode 2!Lets get Physical, Physical. I wanna get Physical...In this episode, we delve into the critical interplay between physical security and cyber security within Operational Technology (OT) environments. In this months episode we discuss the importance of well-defined physical security policies, robust perimeter controls, and effective access management to protect sensitive areas and critical assets. Key topics include establishing security perimeters, entry controls, and physical segmentation, along with the roles and responsibilities of personnel in maintaining these security measures.We discus the need for a unified approach that integrates physical and cyber security strategies, ensuring that both realms work in harmony to protect against threats from all angles. So as always grab your favourite brew and join us for another episode of Cyber Brews!
--------
45:29
Cyber Brews - From Hacks to Heroes: 2024 in OT Cyber security
Welcome everybody to Series 2 of Cyber Brews the series that tries to make OT Cyber–Security Interesting!!
In this episode of Cyber Brews, we take a deep dive into the biggest cybersecurity stories we covered in 2024.
From shocking insider threat statistics to the evolving tactics of ransomware groups like Ransomhub, we break down the key trends shaping the cyber landscape.
We also revisit wild stories like the Dieselgate scandal, hackers targeting air-gapped systems, and even how lava lamps and internal door pass-codes played a role in security breaches.
Plus, we explore the unexpected collaboration between Western hackers and Russian organised crime groups.
So grab your brew and join us for a recap you won’t want to miss!
--------
53:53
Cyber Brews - Securing the Death Star of Change
Welcome to the Final Episode of the Year—Episode Six!
In this closing episode of 2024, we dive into the critical topic of management of change (MoC) in the context of OT cybersecurity.
We kick things off with a look at the iconic failure of the Empire's Death Star and explore how its downfall can teach us valuable lessons for managing change in operational technology environments.
In this Episode we cover:
The Death Star Example: A discussion of one of the most iconic and catastrophic management of change (MoC) failures, analysing how overlooked risks and gaps in planning led to its downfall—and what lessons we can apply to cyber security today.
MoC Assessment Basics: Exploring the foundational elements of a robust MoC process, including conducting thorough risk assessments, maintaining accurate and up-to-date documentation, and identifying critical records essential to cyber security.
Supply Chain Risk: Understanding the risks posed by vendor-supplied default configurations—do you really know what’s in them? Examining how changes in the supply chain may impact current physical security controls and whether those changes could alter the criticality of your operations.
Employee Training: Highlighting the importance of employee education and preparedness in the MoC process. How do training programs ensure staff adapt to and manage changes effectively while maintaining a strong security posture?
Join us as we uncover the complex layers of OT cybersecurity, the importance of thorough risk assessments, and the real-world impacts of implementing robust change management strategies.
Thank you for tuning in throughout 2024. We wish you a Merry Christmas and look forward to bringing you Series 2 of the Cyber Brews Podcast in 2025, with even more exciting episodes planned!
--------
51:20
Cyber Brews - The Risk & Consequence Chronicles
Welcome to Episode Five of Our Podcast!
In this episode, we dive into the critical topic of Risk and Consequence in the context of OT cybersecurity. Here, we share our insights on cyber risks and the potential consequences organisations face.
In This Episode, We Cover:
Risk Assessment Basics: We discuss the foundations of cyber risk assessments, focusing on identifying deviations from normal operations and exploring key concepts like "attack vectors" and the "kill chain."
Example Incident: We examine the CrowdStrike case to understand how OT risk assessments account for insider threats and unintended consequences.
Likelihood and Attack Types: We look at the frequency and variety of cyber threats, considering how risk changes based on the type of attacker, from disgruntled employees to bot-driven attacks.
Mitigation Strategies: We wrap up with a look at prevention versus mitigation, discussing ways to prioritize actions and implement these countermeasures despite the challenge of quantifying cyber risks.
Join us in exploring the complex layers of OT cybersecurity risk assessments and the real-world impacts of these measures.
Thank you for tuning in, and don’t forget to rate our podcast as we continue our journey through the world of OT cybersecurity!
--------
56:30
Cyber Brews - NIS2: The Adventure Continues
Episode Four - NIS2 Unveiled: The Future of Cyber security Compliance.
Welcome to Episode Four of our podcast! In this podcast episode, we delve into the NIS2 directive, which aims to enhance cyber security resilience in critical sectors across the European Union & and maybe even some of the UK!
Investigate the facts behind the directive:
Impact: Strengthening Cyber Defenses in Energy, Transport, Banking, and More
Unpacked: How UK Companies Navigate Enhanced Cybersecurity Requirements
NIS2 and OT: Expanding Scope, Stricter Security, and Reporting Demands
Compliance: Establishing a Cyber Security Management System (CSMS) for Structured Resilience
Reporting: Understanding "Undue Delay" and Significance in Incident Notification
Directive: Proactive Measures for Cybersecurity Resilience in Critical Sectors
Join us as we uncover the Expanding layers of OT cybersecurity and the adventures of NIS2.
Thank you for tuning in to our exploration of OT cybersecurity and don't forget to rate our podcast!
À propos de Cyber Brews - The Operational Technologies Podcast
Cyber Brews looks to take the topic of cyber security in the ICS and Operational technologies domain and break it down into sizable chunks.
Each episode we will look to talk about a new topic of interest in the ongoing cyber world. Looking into to areas such as Ransomware, cyber culture and more!
The podcast is not funded and just our passion to talk about cyber security so please come join us in adventuring into the OT world.
Check us out on YouTube: https://www.youtube.com/watch?v=gyXdfRW4UYg