OT’s Hidden Cyber Risks

One year of Hackers Roadmaps

Find Threat Talks on

Hack the Infrastructure

OT’s Hidden Cyber Risks

From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.

In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.

Key topics they tackle:
🛳️ Why are modern ships, airports, hospitals and even cities targeted?
🛡️ What makes OT so hard to secure compared to IT?
✈ What do real-world OT threats look like and how can we defend against them?

If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.

 

Your cybersecurity experts

TC Hoot Image

TC Hoot

Vice President of Contracts
Technology Advancement Center

Luca Cipriano, Threat Intel Specialst, ON2IT

Luca Cipriano

Threat Intel Specialist
ON2IT

Rob Maas, Field CTO, ON2IT

Karin Muller

Business Development Executive
ON2IT

Episode details

Why OT Cybersecurity Matters More Than You Think

OT isn’t just for factories and ships anymore. It’s embedded in our cities, airports, water treatment plants, and hospitals, and it’s critically underprotected.

In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT), to explore how these vulnerabilities came to be and what it takes to fight against them.

They explore how OT systems were built to be reliable and available, not necessarily secure, and how the internet-connected world has exposed that design flaw. From compromised baggage systems and manipulated airport fuel pumps to altered water treatment settings in hospitals, the risks are real and growing.

But this isn’t about fear, it’s about facing the facts. OT is everywhere, and most people don’t even know they rely on it every day. ON2IT and TAC are working together to build awareness and create hands-on environments that show exactly how OT can be attacked.

Whether you work in security, tech, or critical infrastructure, this episode gives a grounded view of the problem and the steps being taken to solve it.

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

5 + 10 =

Christmas Hacker