Smarter Vulnerability Management in OT Systems: Building Resilience
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
Episode: Smarter Vulnerability Management in OT Systems: Building Resilience
Pub date: 2025-11-20
Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization
As OT environments face rising geopolitical tensions, ransomware threats, and aging infrastructure, vulnerability management has never been more complex. In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Stuxnet expert Ralph Langner, Founder and CEO of Langner, Inc.
Ralph shares from his decades of firsthand experience defending industrial control systems and explains why traditional CVE-focused vulnerability management falls short in OT. He breaks down the three major categories of OT vulnerabilities—design flaws, feature abuse, and configuration errors—and reveals why competent attackers often ignore CVEs entirely. Joe highlights how memory-based vulnerabilities continue to threaten critical systems and why eliminating entire vulnerability classes can create an asymmetric advantage for defenders.
Together, Ralph and Joe explore:
- Why most OT equipment remains insecure by design and why replacement will take decades
- How features, not bugs, often become the real attack vector
- The growing role of ransomware and IT-side weaknesses in OT compromises
- Practical steps OT defenders can take today to incrementally improve resilience
- The value of class-level protections, better architectures, and secure development processes
Whether you secure energy infrastructure, manufacturing systems, or mixed IT/OT networks, this episode delivers experience-driven guidance for strengthening cyber-physical resilience.
The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.