Something sinister is stirring in the systems…In this Cyber Brews Halloween Special, we dive into the true story behind one of the most chilling cyber incidents in industrial history the Triton malware attack.What began as a routine night in a control room turned into a digital nightmare, when rogue code infiltrated safety systems designed to prevent catastrophic industrial accidents.With a Halloween twist, “Ghost in the Control Room” explores how a few hidden lines of code nearly turned a secure facility into a scene of chaos — and what this haunting real-world case teaches us about human error, resilience, and the invisible forces moving through our networks.So grab your favourite brew, turn down the lights and settle in for a Halloween Special.
--------
17:57
--------
17:57
Cyber Brews - What’s Brewing in IEC 62443-2-2?
Series 2 – Episode 6!This month’s brew takes a fresh look at the latest updates in IEC 62443-2-2:2025 — The standard that sets out requirements for industrial automation and control system security programs. If that sounds a bit dry, don’t worry — we’re serving it up in plain English, with a dash of Dave & Chris -style "banter".In this episode, we break down what’s new in the revised standard, why it matters, and how these changes impact organizations looking to strengthen their OT security posture.Key topics on tap this month include:What IEC 62443-2-2 actually covers and why it’s importantThe most significant changes in the latest updateHow these updates affect compliance and real-world implementationSo grab your favourite brew and join us as we try to make sense of the updates in the new IEC 62443-2-2:2025 — hopefully without the headache.
Series 2 – Episode 5!Cyber Brews: IEC-62443 Security Levels, Simplified?This month’s brew tackles the industrial cybersecurity standard that everyone talks about — but few really get: IEC 62443. If you’ve ever felt lost in a sea of FRs, SRs, and SLs, you’re not alone. We’re here to break it down, coffee (or pint) in hand.In this episode, we unpack the core components of IEC 62443 — from Foundational Requirements (FRs) to Security Levels (SLs) — and explore what they actually mean for real-world OT environments.Key topics on tap include: What the different Security Levels (SL1 to SL4) actually represent — and why SL4 isn’t always the goalThe role of Foundational Requirements (FRs) and how they structure your cybersecurity baselineHow System Requirements (SRs) map to practical controls in the field Why context matters: understanding your risk, your environment, and your realistic target levelSo whether you’re just getting into IEC 62443 or trying to explain it to someone else without inducing a yawn, this episode’s for you.Grab your brew of choice and join us as we demystify the standard — one security level at a time.
--------
42:51
--------
42:51
Cyber Brews - Trust No One, Verify Everything (Zero Trust)
Series 2 – Episode 4!Cyber Brews: Trust No One, Verify Everything (Zero Trust)This month’s brew dives into a game-changing security model that’s making waves in both IT and OT: Zero Trust. Forget the old perimeter mindset — in this episode, we explore why trust is no longer a security strategy, especially when it comes to protecting critical industrial systems.We kick off with a breakdown of what Zero Trust actually means, where it came from, and why it’s become essential in the world of Operational Technology. As OT and IT networks continue to converge, the traditional “trust but verify” approach just doesn’t cut it anymore.Key topics on the table include:Why OT environments need Zero Trust now more than ever.How to apply Role-Based Access Control, Network Segmentation, MFA, and Continuous Monitoring in industrial settings.The real-world benefits of Zero Trust: from reduced insider threats to better compliance and resilience.Common challenges and how to start making progress, even in complex legacy environments.So grab your favourite brew and join us as we unravel how Zero Trust could secure the future of OT — one segment, one policy, one verified connection at a time.
--------
41:08
--------
41:08
Cyber Brews - CEOs meet Cyber
Series 2 - Episode 3!Cyber Brews: CEOs meet CyberThis time, we’re flipping the script and taking cybersecurity straight to the top. That’s right — we’re talking senior management and the critical questions they need to be asking when it comes to protecting Operational Technology (OT).In this episode, we unpack the essential governance-level questions that help leaders understand their organization's cyber risk posture. From assessing the cyber threat landscape to defining roles and responsibilities the various teams, we dive into the high-level decisions that can make or break your organization’s resilience.We will cover topics like:Understanding your threat surface and who’s targeting your systemsThe importance of a complete asset inventory and dealing with obsolete equipmentHow to evaluate your risk management and incident response plansWhy clarity in responsibilities (especially between IT and OT) is non-negotiableUsing frameworks like IEC 62443 to guide your cybersecurity governanceSo grab your favourite brew and join us as we arm the boardroom with the right questions to protect the control room.
À propos de Cyber Brews - The Operational Technologies Podcast
Cyber Brews explores the world of Cybersecurity in Industrial Control Systems (ICS) and Operational Technology (OT) — one conversation (and one brew) at a time.
Each episode breaks down complex cyber topics into easy-to-digest discussions. From ransomware in critical infrastructure to OT security culture, we dive into real-world challenges, emerging threats, and the people behind the systems that keep industry running safely.
This is an independent, passion-driven podcast created by cybersecurity professionals who love to share stories, insights, and lessons from the front lines of industry.