Precision Time Protocol

One year of Hackers Roadmaps

Listen this Threat Talk on

Precision Time Protocol

Why time synchronization matters more than you think

 

Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by Jan van Boesschoten (Innovation Manager at AMS-IX) to explore why accurate timekeeping is essential for security, compliance, and operational integrity.

⏳ How does time impact cybersecurity, and what happens when it drifts?
⏳ Why is NTP no longer sufficient for high-speed digital transactions?
⏳ How does Precision Time Protocol (PTP) provide microsecond accuracy (and why does that matter)?
⏳ Could time manipulation be an attack vector, and how do organizations mitigate this risk?

From high-frequency trading to forensic log analysis, time synchronization plays a key role in determining the sequence of events. Find out what the risks are of relying solely on satellite-based time sources, the vulnerabilities of public NTP servers, and why a backup strategy for time is just as important as one for data.

Explore todays hacks in detail

Find a complete overview of all attacks featured in 2025.

Your cybersecurity experts

Lieuwe Jan Koning, Co-Founder and CTO, ON2IT

Jan van Boesschoten

Innovation Manager
AMS-IX

Rob Maas

Rob Maas

Field CTO
ON2IT

Episode details

Accurate timekeeping is often taken for granted, but in cybersecurity, precision timing is crucial. From financial transactions to forensic log analysis, knowing exactly when an event occurs can make or break an organization’s security posture.

In this episode of Threat Talks, Rob Maas and Jan van Boesschoten take a deep dive into Precision Time Protocol (PTP) and why more organizations should be adopting it.

They discuss:

✅ How time synchronization impacts cybersecurity, from fraud prevention to forensic investigations.
✅ Why relying on satellite-based time can expose organizations to attacks.
✅ Real-world examples of time drift causing major operational issues.

When time synchronization fails, organizations risk inaccurate logs, failed transactions, and even security breaches.

PS. Find out more about the Cybersecurity Canon here: https://icdt.osu.edu/about-cybersecurity-canon

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

13 + 12 =

Christmas Hacker