Precision Time Protocol
Listen this Threat Talk on
Precision Time Protocol
Why time synchronization matters more than you think
Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by Jan van Boesschoten (Innovation Manager at AMS-IX) to explore why accurate timekeeping is essential for security, compliance, and operational integrity.
⏳ How does time impact cybersecurity, and what happens when it drifts?
⏳ Why is NTP no longer sufficient for high-speed digital transactions?
⏳ How does Precision Time Protocol (PTP) provide microsecond accuracy (and why does that matter)?
⏳ Could time manipulation be an attack vector, and how do organizations mitigate this risk?
From high-frequency trading to forensic log analysis, time synchronization plays a key role in determining the sequence of events. Find out what the risks are of relying solely on satellite-based time sources, the vulnerabilities of public NTP servers, and why a backup strategy for time is just as important as one for data.
Explore todays hacks in detail
Find a complete overview of all attacks featured in 2025.
Your cybersecurity experts
Jan van Boesschoten
Innovation Manager
AMS-IX
Rob Maas
Field CTO
ON2IT
Episode details
Accurate timekeeping is often taken for granted, but in cybersecurity, precision timing is crucial. From financial transactions to forensic log analysis, knowing exactly when an event occurs can make or break an organization’s security posture.
In this episode of Threat Talks, Rob Maas and Jan van Boesschoten take a deep dive into Precision Time Protocol (PTP) and why more organizations should be adopting it.
They discuss:
✅ How time synchronization impacts cybersecurity, from fraud prevention to forensic investigations.
✅ Why relying on satellite-based time can expose organizations to attacks.
✅ Real-world examples of time drift causing major operational issues.
When time synchronization fails, organizations risk inaccurate logs, failed transactions, and even security breaches.
PS. Find out more about the Cybersecurity Canon here: https://icdt.osu.edu/about-cybersecurity-canon
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
