Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible eliminating lateral movement Connecting users only to specific apps, not the entire network Continuously verifying every request based on identity and context Simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more at Zscaler.com Security.
A (1:34)
The word is OT security, spelled O for operational, T for technology and security as in protection definition Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. Example sentence IT and OT cybersecurity differ in fundamental ways, not only because IT and OT systems often require different security controls, but also because IT and OT security practitioners have different goals for securing their assets and different definitions for what secure means, origin and context. One of the world's first OT attacks occurred in 1903 when Guillemo Marconi yes, that Marconi, that famous Italian engineer who invented the first practical wireless telegraph, attempted to securely send a message from a clifftop radio station in Cornwall, UK to London some 300 miles away. Neville Maskelyne, working for a Marconi competitor, the Eastern Telegraph Company, executed maybe the first ever man in the middle attack, intercepting the traffic and sending Morse code to the distant inn. Mocking Marconi and you thought our modern day Internet head trolls. Operational technology consists of a superset of non traditional electronics and software. In other words, these are systems not designed for the standard office worker and can control government, commercial and home processes like water, power, air conditioning and heating. Within the OT superset are industrial control systems or ics. These are systems that control essential industrial processes like mine site conveyor belts, oil refinery cracking towers and electrical grade power consumption. The key word there is essential processes that are emission critical and have a high availability requirement. According to Graham Williamson from Kupinger coal analyst, most ICSs fall into either a continuous process control system typically managed via programmable logic controllers or PLCs or discrete process control systems or DPCs. These might use a PLC or some other batch process control device. Industrial control systems are often managed via a Supervisory Control and Data acquisition system or SCADA system. These provide a graphical user interface for operators to easily observe the status of a system, receive any alarms indicating out of band operation, or to enter system adjustments to manage the process under control. In March 2000, Vydeck Bowden launched an industrial control system attack on Queensland, Australia that resulted in the leaking of millions of gallons of untreated sewage into the surrounding waterways and parks. In a rare Jason Bourne like car chase scene right out of the movies, the police captured Witek with his laptop, SCADA equipment and the radio transmitter he used to carry out the attacks. In 2006, researchers at the Gartner Energy and Utilities IT Summit presented the term operational technology as applied to industrial control systems. Over the next decade, the alignment and integration of IT and OT systems picked up traction in the industrial space. In late 2015, a group of Russian hackers called Sandworm attacked Ukraine's power grid, causing the first ever blackout triggered by a cyber attack. According to the U.S. department of Energy, threat actors on multiple fronts continue to exploit cyber vulnerabilities in the U.S. electrical grid. Nation states like Russia, China and Iran and non state actors including foreign terrorist and hacktivist groups pose varying threats to the power grid. End quote Nerd reference in the Cybersecurity Canon hall of Fame book A New Era of Cyber War and the Hunt for the Kremlin's Most Dangerous Hackers by Wired columnist Andy Greenberg. Andy describes the Russian GRU's use of Ukraine as a training lab to use cyber attack to cripple and destroy an enemy's critical infrastructure.
![OT security (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F84d0c05a-f2dd-11ef-9fb0-6f4e6d664a7d%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)