How Stolen Credentials Break Industrial Plants
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
In this episode, we dive deep into the escalating threat landscape facing both enterprise IT and Operational Technology (OT) environments. Drawing from the eye-opening 2025 Verizon Data Breach Investigations Report, we unpack why stolen credentials and third-party vulnerabilities remain the top initial access vectors for ransomware and other devastating attacks.
We move beyond theory to analyze real-world cyber incidents, from disruptive ransomware attacks on healthcare providers like Synnovis in the UK, to coordinated sabotage and malware infections impacting major European railway networks. What happens when critical infrastructure is compromised, and how can organizations prevent a cyber incident from becoming a physical safety hazard?
Join us as we explore practical defense strategies and the concept of operational resilience. We discuss the necessity of adapting Zero Trust architectures—aligned with the NIST SP 800-207 framework—specifically for OT and Cyber-Physical Systems, where process determinism and safety are non-negotiable.
Listeners will also learn why Identity and Access Management (IAM) is the new frontline of cybersecurity. We highlight the often-overlooked challenge of securing machine and non-human identities, which vastly outnumber human users in industrial settings and represent a massive blind spot for many security programs. Finally, we explore cutting-edge solutions for legacy environments, such as crypto-agility through exchangeable smart cards and the secure deployment of the Future Railway Mobile Communication System (FRMCS).
Whether you're a CISO balancing IT/OT convergence, or a security engineer securing complex supply chains, this episode delivers the actionable engineering lessons you need to keep your operations running safely under pressure