The OT Attack Cyber kill Chain
Listen this Threat Talk on
The OT attack cyber kill chain
Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work?
In this Deep Dive, Rob Maas (Field CTO ON2IT) and Luca Cipriano (CTI and Red Team Program Lead ON2IT) discuss the complexity of OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.
Key topics:
⚙️ How IT and OT attacks differ
☠️ What the ICS cyber kill chain is
🌎 How OT attacks can impact whole nations
Are the prevention steps to protect yourself against an IT attack the same as for an OT attack? Find out in this Deep Dive on OT!
Your cybersecurity experts
Rob Maas
Field CTO
ON2IT
Luca Cipriano
Red Team & Cyber Threat Intelligence Program Lead
ON2IT
Episode details
How OT attacks can impact whole nations
OT is intrinsically linked to infrastructure: everything from the hospital’s HVAC system to the country’s entire water management system runs on operational technology. It’s no secret that it’s vulnerable – but what exactly would an OT attack look like?
In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?
The main threat actors for OT attacks are likely nation state actors, or hacktivists. What are their motivations?
Additional Resources:
► Operational Technology for Dummies (Previous Episode)
► Inside Volt Typhoon: China’s Silent Cyber Threat
► Hack the Boat – cybersecurity on the high seas 🌊 – Threat Talks Cybersecurity Podcast
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
