Threat Talks
2024: The Breaking Point
Listen to this episode of Threat Talks on2024 - The Breaking Point One Year of Threat Talks As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel (CEO of...
Prevent, Pay or Insure
Find this Threat Talk onPrevent, Pay or Insure? The road to cyber resilience Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay...
Breaking the Illusion: Exposing Security Fallacies
Find this Threat Talk onExposing Security Fallacies Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies Are we truly protecting ourselves from cyber threats, or are we blinded by outdated security practices? In this episode of Threat Talks, ON2IT’s...
Hack the Boat
Find Threat Talks onHack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show...
Bridging the Gap: Security and Compliance
Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...
The Evolution of Cyber Warfare
Find Threat Talks onThe Evolution of Cyber Warfare Advanced Threat Intelligence helps you know your enemy. Explore the hidden world of cyber warfare and Advanced Persistent Threats (APT's) with Threat Intel Specialist Luca Cipriano and special guest Cyber Security...
Breaking the Bank
Breaking the bank Financial sector cybersecurity threatsIn this episode, special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically "robs" banks to reveal security weaknesses. By exploiting human vulnerabilities rather...
Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition
Cyber Guardians: Anti-DDoS Coalition This special episode is a discussion on the importance of defending against DDoS attacks, particularly for businesses that rely on online tools and websites. The host, Lieuwe Jan Koning from ON2IT and special guests Remco Poortinga...
Zero Trust with John Kindervag – Threat Talks on tour: Part 2
Threat Talks on Tour - Live from the RSA | Part 2 Zero Trust with John Kindervag Lieuwe Jan Koning, speaking from the RSA Conference in San Francisco, welcomes John Kindervag to delve into the concept of Zero Trust in cybersecurity. This episode is a sequel to...
Zero Trust with John Kindervag – Threat Talks on tour: Live from the RSA
Threat Talks on Tour - Live from the RSA | Part 1 Zero Trust with John Kindervag In this special episode of Threat Talks, host Lieuwe Jan Koning interviews John Kindervag, the creator of Zero Trust, at the RSA conference in San Francisco. They delve into the...
Healthcare: Responsibilities, regulations and legacies
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITRob Maas Field CTO, ON2ITSina Yazdanmehr Founder and Managing Director, Aplite GmbHHealthcare: Responsibilities, regulations and legacies The episode discusses the...
Unraveling CVE-2024-3400: a comprehensive analysis of the vulnerability
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITUnraveling CVE-2024-3400 A Comprehensive Analysis of the Vulnerability In this special episode of...
Deep Dives
Blockchain in a Post-Quantum World
Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this...
Windows Recall: Convenience or Catastrophe?
Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database....
Zero Trust Step Three: Build a Zero Trust Architecture
Find Threat Talks onZero Trust Step 3: From Ideas to Implementation Build a Zero Trust Architecture Now that you’ve defined your protect surfaces and mapped your transaction...
Cybersecurity Without Borders
Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the...
Will AI Replace Human Pentesters?
Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or...
Zero Trust Step 2: Map the Transaction Flows
Find Threat Talks onZero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust),...
The OT Attack Cyber kill Chain
Listen this Threat Talk onThe OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re...
Operational Technology for Dummies
Listen this Threat Talk onOperational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology...
Zero Trust Starts Here: Define Your Protect Surface
Find Threat Talks onZero Trust Deep Dive: Step One Done Right Define your protect surface Zero Trust is about more than just IP addresses and firewalls: it’s about understanding...
Zero Trust Demystified: What is Zero Trust Really About?
Find Threat Talks onZero Trust Demystified What is Zero Trust Really About? Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of...
Inside Volt Typhoon: China’s Silent Cyber Threat
Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating...
Cybercrime-as-a-Service: The Disney+ of the Dark Web
Listen this Threat Talk onDark Markets: The Disney+ of Cybercrime Exploring Dark Markets with Michele Campobasso Cybercriminals can now ‘subscribe’ to hacking tools,...



















