Threat Talks

Breaking the Illusion: Exposing Security Fallacies

Breaking the Illusion: Exposing Security Fallacies

Find this Threat Talk onExposing Security Fallacies Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies Are we truly protecting ourselves from cyber threats, or are we blinded by outdated security practices? In this episode of Threat Talks, ON2IT’s...

Hack the Boat

Hack the Boat

Find Threat Talks onHack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show...

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...

The Evolution of Cyber Warfare

The Evolution of Cyber Warfare

Find Threat Talks onThe Evolution of Cyber Warfare Advanced Threat Intelligence helps you know your enemy. Explore the hidden world of cyber warfare and Advanced Persistent Threats (APT's) with Threat Intel Specialist Luca Cipriano and special guest Cyber Security...

Breaking the Bank

Breaking the Bank

Breaking the bank Financial sector cybersecurity threatsIn this episode, special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically "robs" banks to reveal security weaknesses. By exploiting human vulnerabilities rather...

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Cyber Guardians: Anti-DDoS Coalition This special episode is a discussion on the importance of defending against DDoS attacks, particularly for businesses that rely on online tools and websites. The host, Lieuwe Jan Koning from ON2IT and special guests Remco Poortinga...

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Threat Talks on Tour - Live from the RSA | Part 2 Zero Trust with John Kindervag   Lieuwe Jan Koning, speaking from the RSA Conference in San Francisco, welcomes John Kindervag to delve into the concept of Zero Trust in cybersecurity. This episode is a sequel to...

Healthcare: Responsibilities, regulations and legacies

Healthcare: Responsibilities, regulations and legacies

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITRob Maas Field CTO, ON2ITSina Yazdanmehr Founder and Managing Director, Aplite GmbHHealthcare: Responsibilities, regulations and legacies The episode discusses the...

Supply Chain: Business as usual?

Supply Chain: Business as usual?

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITMatthijs Zwart CIO and CISO Vitens Supply chain: Business as usual?  As reliance on third-party and open-source software grows,...

The Authentication Apocalypse

The Authentication Apocalypse

Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITHarald Bosman Senior Endpoint Engineer, AMS-IXThe Authentication Apocalypse Word of data breaches and stolen credentials reaches the news almost every...

Deep Dives

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or...

Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows

Find Threat Talks onZero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust),...

The OT Attack Cyber kill Chain

The OT Attack Cyber kill Chain

Listen this Threat Talk onThe OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re...

Operational Technology for Dummies

Operational Technology for Dummies

Listen this Threat Talk onOperational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology...

Intrusion Kill Chain with Rick Howard

Intrusion Kill Chain with Rick Howard

Listen this Threat Talk onIntrusion Kill Chain with Rick Howard Turning the Tables on Attackers   In this episode, host Lieuwe Jan Koning is once again joined by Rick...

The Rising Threat of Deepfakes

The Rising Threat of Deepfakes

Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful...

Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass

Listen this Threat Talk onBreaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits...