The OT Attack Cyber kill Chain

One year of Hackers Roadmaps

Listen this Threat Talk on

The OT attack cyber kill chain

Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work?

In this Deep Dive, Rob Maas (Field CTO ON2IT) and Luca Cipriano (CTI and Red Team Program Lead ON2IT) discuss the complexity of OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.

Key topics:
⚙️ How IT and OT attacks differ
☠️ What the ICS cyber kill chain is
🌎 How OT attacks can impact whole nations

Are the prevention steps to protect yourself against an IT attack the same as for an OT attack? Find out in this Deep Dive on OT!

Your cybersecurity experts

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Luca Cipriano, Threat Intel Specialst, ON2IT

Luca Cipriano

Red Team & Cyber Threat Intelligence Program Lead
ON2IT

Episode details

How OT attacks can impact whole nations

 OT is intrinsically linked to infrastructure: everything from the hospital’s HVAC system to the country’s entire water management system runs on operational technology. It’s no secret that it’s vulnerable – but what exactly would an OT attack look like?

In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?

The main threat actors for OT attacks are likely nation state actors, or hacktivists. What are their motivations?

Additional Resources:
Operational Technology for Dummies (Previous Episode)
Inside Volt Typhoon: China’s Silent Cyber Threat
Hack the Boat – cybersecurity on the high seas 🌊 – Threat Talks Cybersecurity Podcast

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

1 + 15 =

Christmas Hacker