Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks - Your Gateway to Cybersecurity Insights

Podkast av Threat Talks

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Prøv gratis i 7 dager

99,00 kr / Måned etter prøveperioden.Avslutt når som helst.

Prøv gratis

Alle episoder

70 Episoder
episode Operational Technology for Dummies artwork
Operational Technology for Dummies

From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats.   In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we can start securing both before it’s too late.   Key topics: ⚙️ What OT is (and isn’t) 📉 Why IT and OT often don’t speak the same language 🛠️ Real-life OT cyberattacks (hello, FrostyGoop and TRITON) Welcome to OT 101: explained in plain language, with a healthy dose of practicality.

13. mai 2025 - 26 min
episode OT’s Hidden Cyber Risks artwork
OT’s Hidden Cyber Risks

From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.   In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.   Key topics they tackle: 🛳️ Why are modern ships, airports, hospitals and even cities targeted? 🛡️ What makes OT so hard to secure compared to IT? ✈ What do real-world OT threats look like and how can we defend against them?   If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.

06. mai 2025 - 31 min
episode Zero Trust Starts Here artwork
Zero Trust Starts Here

Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation. In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface. They explore: ✅ Methods for defining protect surfaces ⛨ Establishing the relevance of each protect surface 📈 How to align your cybersecurity with business needs and goals In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key.

29. apr. 2025 - 22 min
episode Zero Trust Demystified: What is Zero Trust Really About? artwork
Zero Trust Demystified: What is Zero Trust Really About?

Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools. They discuss: ✅ Why Zero Trust isn’t a product, and what it actually is 🗺️ The five steps and four core principles of Zero Trust 🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation They debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.

22. apr. 2025 - 20 min
episode Inside Volt Typhoon: China’s Silent Cyber Threat artwork
Inside Volt Typhoon: China’s Silent Cyber Threat

What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.   In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be.   💨 What makes “low and slow” attacks so hard to detect? 🔧 How do living-off-the-land tactics help attackers blend in? 📉 What motivations do threat actors like Volt Typhoon have?   Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode.

15. apr. 2025 - 34 min
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️

Prøv gratis i 7 dager

99,00 kr / Måned etter prøveperioden.Avslutt når som helst.

Eksklusive podkaster

Uten reklame

Gratis podkaster

Lydbøker

20 timer i måneden

Prøv gratis

Bare på Podimo

Populære lydbøker