CyberWire Daily — "The Unseen World [Cyber Things]"
Host: Rebecca Craddock (Armis, VP Global Communications)
Guest: Kam Chumlee Sultani (Armis, Director of OT Solutions Engineering)
Date: December 3, 2025
Theme: Exploring the hidden or "upside down" world of cybersecurity, particularly within critical infrastructure, through parallels with Stranger Things.
Episode Overview
This episode marks the start of a special miniseries called "Cyber Things", inspired by Stranger Things. The focus is on the unseen, often overlooked cybersecurity threats lurking in the digital "upside down": unknown devices, silent intruders, and evolving threats, especially in the context of critical infrastructure. Host Rebecca Craddock and guest Kam Chumlee Sultani bridge concepts from pop culture to the realities of the cyber domain, aiming to provoke thought, debate, and active defense strategies for the coming year.
Key Discussion Points & Insights
1. The Digital Upside Down: Parallels with Stranger Things
-
Unseen Threats and Devices:
- The digital world is full of hidden devices and silent intruders, much like the Stranger Things upside down.
- The rise of IT/OT convergence means more devices have internet connectivity, expanding possible attack vectors.
“You can almost think about it as the Internet is the main gate or the mother gate.” – Kam (05:31)
-
Critical Infrastructure at Risk:
- 2025 was described as the worst year yet for attacks on critical infrastructure, including water utilities, electric grids, pharma, rail, and aviation.
- The increase in attacks is attributed to the digital convergence of operational technology (OT) and information technology (IT).
2. Anatomy of Modern Cyber Attacks
-
Attack Vectors & Spread:
- Compromised devices are no longer just endpoints but can serve as “catalysts” for further lateral movement.
- Each vulnerable device becomes a potential “pivot point”, facilitating broader attacks on critical systems.
- Kam likens advanced attackers (APTs or nation-states) to the Stranger Things’ “Mind Flayer”, orchestrating lower-tier “soldiers” (hackers, automated bots) via the “Mother Gate” (internet).
“Imagine the Mind Flayer as the brains or an advanced persistent threat or a nation state actor.” — Kam (08:21)
-
Air-gapped Isn't Always Air-gapped:
- Security assumptions can be illusory; “air-gapped” networks may have hidden connections or supply chain weaknesses.
- Real-world exercises often reveal unexpected IT/OT pivots left unsecured.
3. Defending Against the Unknown
-
Visibility is Power:
- Step one: Inventory and continuously monitor all devices and communications in the environment.
- Kam emphasizes starting with visibility, then moving to vulnerability management, active threat detection, and ongoing process review.
“You need to do an initial assessment to understand what devices you even have… what's talking to what, what's insecure, what's vulnerable.” — Kam (08:07)
-
The Process: Crawl, Walk, Run:
- Kam advises a phased approach—beginning with foundational asset visibility and culminating in active, collaborative defense mechanisms.
4. The AI Effect: Accelerating Threats
-
AI as Force Multiplier:
- AI has significantly sped up “time to hack” and enables attackers to learn from each breach, rapidly adapting playbooks across industry verticals.
- Defensive teams must likewise harness AI, but beware of “alert fatigue”: focusing efforts on meaningful signals rather than being drowned in noise.
-
Attack Path Mapping:
- Modern defense should leverage tools that identify not just vulnerabilities but actual attack paths—predicting how an adversary might traverse the network.
5. Awareness, Control, and the Myth of Safety
-
Awareness is Both Key and Illusory:
- Even with visibility tools, the dynamic nature of modern businesses—guest access, supply chain integrations, rapid device onboarding—renders total control an “illusion.”
“Awareness and control is complete illusion. So how do you then get into that proactive defense mode…?” — Rebecca (16:48)
- Even with visibility tools, the dynamic nature of modern businesses—guest access, supply chain integrations, rapid device onboarding—renders total control an “illusion.”
-
Beyond Reaction: Proactive Defense:
- Real-world attackers often live “off the land” for months before launching attacks.
- Information sharing, both within an organization (IT/OT collaboration) and externally (via public-private partnerships and ISACs), fortifies proactive security.
6. The Power of Teamwork: Cybersecurity as a Community Effort
-
Teamwork in Defense:
- Mirroring the Stranger Things crew, diverse contributions and trusted partnerships inside and outside organizations prove critical for defense.
-
Cybersecurity in Ordinary Life:
- Cyber issues now affect everyone—from industry to everyday families. Public awareness is at an all-time high, underscoring the importance of making security a mainstream concern.
Notable Quotes & Memorable Moments
-
On the Growing Threat to Infrastructure
"Every year we finish and it's like, that was a year, surely it can't get any crazier next year and then it happens." — Kam (03:07)
-
On the Illusion of Air-Gapped Security
"They may say that they're air gapped, but as you do a bit of objection handling and you're sitting down with the teams and you're mapping out network architectures long behold, there may actually be an open pivot point..." — Kam (08:56)
-
On AI Accelerating Threats
"AI has expanded and sped up the mind flare ability … the team of bad actors to really put, put a lot of the emphasis and the speed and the time to hack or time to threat is very, very quick now." — Rebecca (12:15)
-
On Community and Team Defense
"Without each other, they would crumble. It really is a powerhouse team. ... We will use that power to go close the rift." — Kam (17:26)
-
Cybersecurity as a Mainstream Issue
"My grandmother, my parents, my friends, my family... this year feels like it is in every conversation." — Rebecca (19:10)
-
What Next?
"It goes back to those partnerships and building a powerhouse team that regardless of where that rift opens up or how the story changes… you can stay agile and be proactive and use AI to your advantage, right?" — Kam (23:16)
Important Timestamps
- [03:07] — Critical infrastructure under intense threat
- [05:31] — The danger of unseen/rogue devices and the "Mother Gate" analogy
- [07:32] — Building collaborative defense teams; importance of visibility
- [11:56] — AI accelerating the threat landscape
- [16:16] — Awareness and control are constantly challenged
- [18:43] — The necessity of teamwork and information sharing
- [20:59] — Cybersecurity becomes mainstream concern
- [24:19] — The call for active, collective defense and use of AI for good
Conclusion & Look Ahead
The episode closes with a spirited reflection on the challenges and hopes for the cybersecurity community as 2026 approaches. Host and guest agree that while threats are escalating—from critical infrastructure attacks to deepfakes—community, teamwork, and proactive collaboration (mirroring the unity of the Stranger Things team) are essential for defense.
Final Thought
"Awareness, knowledge is power and just being aware of those things and being proactive and not sitting back and sort of waiting for things to happen is going to be crucial." — Rebecca (24:19)
Next Episode Preview
Look forward to interviews with Armis’ Michael Freeman, Nadir Israel, and Curtis Simpson for deeper dives into threat intelligence and further perspectives on the unseen world of cybersecurity.
This summary captures the dynamic, approachable tone of the episode, blending pop culture analogies with practical security advice for professionals and newcomers alike.
