Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows Find Threat Talks on Zero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the...
The OT Attack Cyber kill Chain

The OT Attack Cyber kill Chain

The OT Attack Cyber kill Chain Listen this Threat Talk on The OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT...
Operational Technology for Dummies

Operational Technology for Dummies

Operational Technology for Dummies Listen this Threat Talk on Operational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical...