Artwork
iconShare
 
Manage episode 522105398 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remain dangerously exposed.

What You'll Learn:

  • Why industrial control systems can't be updated like your laptop—and what that means for security
  • How threat actors are using AI to generate custom malware for power plants and water treatment facilities
  • The real state of critical infrastructure security (spoiler: forget about air gaps)
  • Why commodity ransomware has become an existential threat to industrial operations
  • The five critical controls organizations should implement right now to defend OT environments

Don't wait until your organization becomes the next headline. Like, share, and subscribe for more in-depth security intelligence that goes beyond the buzzwords.

#industrialcybersecurity #criticalinfrastructure #OTsecurity #ICS #SCADA #dragos #incidentresponse #ransomware #AIthreats #cybersecurity #infosec

  continue reading

Chapters

1. Meet Leslie Carhart Of Dragos (00:00:00)

2. What ICS And OT Really Are (00:03:20)

3. The Air Gap Myth And Modern Connectivity (00:06:45)

4. Why Legacy Systems Persist In Critical Ops (00:11:30)

5. How Ransomware Disrupts Industrial Processes (00:16:45)

6. Regulation, Risk, And Practical Constraints (00:20:35)

7. Life Safety Over Perfect Security (00:24:15)

8. Adversaries, Capabilities, And Exposure (00:27:55)

9. Reactive IR Vs Proactive OT Security (00:32:10)

80 episodes