For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, weβre going to look at some of the key insights previous guests have offered on the evolving threat landscape β from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes.
To kick things off, we'll hear from:
- Tom Marsland, VP of Technology for Cloud Range as he discusses threats to our infrastructure and state-sponsored groups from China.
- (3:31) Heβll be followed by Cyberhootβs Craig Taylor as he updates us on phishing schemes.
- (5:45) And then weβll hear from Jon Taylor at Versa Networks as he talks about strategies bad actors are taking in targeting legacy industrial control systems.
While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources β from both a financial and skillset development perspective. We'll dive into comments from:
- (9:26) Corshaβs Anusha Iyer as she discusses supply chain and dwelling attacks.
- (15:33) Venafiβs Kevin Bocek and his take on embedded software vulnerabilities and how hackers are taking advantage of them.
- (22:18) Baker Tillyβs Jeff Krull offers an update on the evolving complexity of ransomware groups and how theyβre targeting the industrial sector.
- (25:20) And finally, letβs wrap up with one of my favorite guests weβve ever had on Security Breach β researcher Jeremiah Fowler. Heβll offer some insight on a number of unique, embedded threats and some of the lessons heβs learned in tangling with state-sponsored Russian hackers.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that youβd like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sectorβs New Battlefield, click here.