Operational Technology for Dummies
Listen this Threat Talk on
Operational Security 101
Buzzwords, Boilers and Breaches
From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they’re wide open to cyber threats.
In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we can start securing both before it’s too late.
Key topics:
⚙️ What OT is (and isn’t)
📉 Why IT and OT often don’t speak the same language
🛠️ Real-life OT cyberattacks (hello, FrostyGoop and TRITON)
Welcome to OT 101: explained in plain language, with a healthy dose of practicality.
Your cybersecurity experts
Rob Maas
Field CTO
ON2IT
Luca Cipriano
Threat Intel Specialist
ON2IT
Episode details
OT 101: Making Sense of Industrial Cybersecurity
Why does OT matter? Because it’s running everything from heating systems in Ukraine to water plants, energy grids, and manufacturing lines. And it’s vulnerable.
In this Deep Dive, Rob Maas and Luca Cipriano break down how OT systems work, from sensors and PLCs to SCADA and HMI, and why understanding these buzzwords matters. They dig into the Purdue Model as a framework, not a rulebook and show how Zero Trust can evolve it to better reflect today’s hybrid OT/IT environments.
Real-world examples like the FrostyGoop malware and the TRITON attack make one thing clear: OT security isn’t optional. If your organization touches critical infrastructure in any way, this episode gives you the grounding to start making smarter decisions.
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
