• The Biggest Hacks of 2024
    Dec 27 2024

    Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.”

    His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at some of the industrial sector’s biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black Hats. Watch/listen as we cover:

    • A unique supply chain hack that came up during our conversation with Theo Zafirakos, a Cyber Risk and Information Security Expert at Fortra.
    • The fall of 2024 brought security compromises to the front door of a number of prominent industrial enterprises, including Halliburton.
    • In early August millions were impacted when National Public Data, a major data broker that performs background checks, reported that 2.9 billion personal records from over a million individuals in the U.S., the U.K. and Canada were accessed.
    • Ford Motor Company was also a target, with a data breach that saw hacking groups steal 44,000 records containing personal and product information.
    • Anna Wells, executive editor of Manufacturing.net and Manufacturing Business Technology, brought us coverage of a hack that has crippled a global beverage maker.
    • We close out with a story from early this year describing how some of the basic tools found throughout a manufacturing plant can become pathways for the innovative hacker.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    41 mins
  • Looking Back to Move Forward
    Dec 12 2024

    As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.

    While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with special focus being given to a handful of the most critical issues confronting our OT environments.

    First, we hear from Jon Taylor (1:16) at Versa, as he discusses a unique approach to patching and secure-by-design strategies that involve the development embedded micro-segmentation approaches.

    Next, we’ll hear from Cloud Range’s Tom Marsland (11:18) as he discusses the continued challenges presented by data silos, and innovative ways to address the shortage of cybersecurity specialists.

    Then we’ll turn to Baker Tilly’s Jeff Krull (19:42) as he reports on ransomware gangs and their combination of new and old tactics.

    And we’ll finish up with cybersecurity researcher Jeremiah Fowler (29:40) as he discusses some of the ongoing challenges about addressing persistent vulnerabilities.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    42 mins
  • AI Is Exposing Your Most Vulnerable Attack Surface
    Dec 9 2024

    According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year.

    And we all know what happens with this hijacked data.

    Per the World Economic Forum’s May 2024 white paper, the number of ransomware attacks on industrial infrastructure doubled in 2023, boosting ransomware to the leading concern for manufacturers, with 40 percent citing it as their top issue. While that may not surprise you, this might - due to the many challenges we’ve discussed here on Security Breach, the industrial sector now accounts for 71 percent of all ransomware attacks.

    Our data is valuable and the hackers know it.

    To offer some perspective on protecting this data, we sat down with Karthik Krishnan, CEO of Concentric.ai – a leading provider of data security posture management solutions. Watch/listen as he provides insight on:

    • Prioritizing and limiting data access to lessen the blast radius.
    • How data, especially customer data, is essentially the "new oil."
    • Reversing your mindset to think about "data out" instead of "user in".
    • The generative AI advancements that continue to be made, and how they're producing more complex phishing and ransomware attacks.
    • Why it has become easier for hackers to get a foothold on your network.
    • The best ways to shore up your weakest security link - employees.
    • How it all starts with data discovery and visualization, then prioritization.
    • A look at the money involved with remediation and response costs versus proper planning and defense prep.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    36 mins
  • Minimizing Hacks by Focusing on Uptime
    Nov 21 2024

    Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.

    Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.

    In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:

    • How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
    • The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
    • Ways to more safely update the growing number of devices on the plant floor.
    • Protecting IP and, more specifically, the software coding associated with it.
    • The impact AI continues to have on increasing the sophistication of hacking attempts.
    • Why all hacks are "highly preventable."
    • The role of quantum computing and the steps to take in preparing for "Q Day".

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    39 mins
  • What Cybersecurity Can Learn from Tom Brady
    Nov 15 2024

    We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.

    Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.

    While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.

    Joining me to discuss these topics and run through a mock exercise will be:

    • Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.
    • Matthew Welling, a partner at Crowell & Moring's Washington, D.C. office, where he works in the firm's Privacy & Cybersecurity Group.
    • Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.

    In addition to the table top exercise, we'll discuss:

    • Communication challenges before, during and after an attack.
    • Response strategies and the evolving dynamic of out-of-band communications.
    • The ongoing challenges of addressing the Human Element of cybersecurity.
    • The impact of regulatory efforts and how they're playing a bigger role in attack response plans.
    • The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.
    • How to control the emotional responses that will undoubtedly emanate from an attack.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    53 mins
  • Threat Landscape Update
    Nov 8 2024

    For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes.

    To kick things off, we'll hear from:

    • Tom Marsland, VP of Technology for Cloud Range as he discusses threats to our infrastructure and state-sponsored groups from China.
    • (3:31) He’ll be followed by Cyberhoot’s Craig Taylor as he updates us on phishing schemes.
    • (5:45) And then we’ll hear from Jon Taylor at Versa Networks as he talks about strategies bad actors are taking in targeting legacy industrial control systems.

    While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources – from both a financial and skillset development perspective. We'll dive into comments from:

    • (9:26) Corsha’s Anusha Iyer as she discusses supply chain and dwelling attacks.
    • (15:33) Venafi’s Kevin Bocek and his take on embedded software vulnerabilities and how hackers are taking advantage of them.
    • (22:18) Baker Tilly’s Jeff Krull offers an update on the evolving complexity of ransomware groups and how they’re targeting the industrial sector.
    • (25:20) And finally, let’s wrap up with one of my favorite guests we’ve ever had on Security Breach – researcher Jeremiah Fowler. He’ll offer some insight on a number of unique, embedded threats and some of the lessons he’s learned in tangling with state-sponsored Russian hackers.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    39 mins
  • The Little Things That Kill
    Oct 31 2024

    While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.

    We know that the frequency of attacks will continue to increase.

    We know that it’s not if your ICS will be probed, but when.

    And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.

    Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response.

    One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:

    • All the little things that are continuing to pose challenges to industrial cybersecurity.
    • Why state-sponsored hacker groups in China are getting more of his attention lately.
    • Why successful incident response is about the people, not the tools.
    • The importance of "training like you fight."
    • His role with VetSec, and the role it can play in filling cybersecurity talent gaps.
    • How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.
    • Why the culture of security needs to permeate throughout the entire organization.
    • How AI can help make the most of your people.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    39 mins
  • Phishing Attack Defense 'Not Rocket Science'
    Oct 24 2024

    Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy.

    And based on Proofpoint’s 2024 State of Phish report, protecting against phishing schemes is simply not being reinforced or given the proper priority. For example,

    • 71% of surveyed users admitted to taking a risky action, and 96% knew they were doing something risky when interacting with email or text messages.
    • 85% of security professionals said that most employees know they are responsible for security, but 59% of employees weren’t sure or claimed that they’re not responsible.
    • Furthermore, 24% admitted to responding to emails or text messages from someone they don’t know, and 19% clicked on links in emails from people they don’t know.
    • Finally, 73% of surveyed companies reported a business email compromise, but only 29% are actively teaching users about BEC attacks.

    To address these and other phishing attack dynamics, I sat down with Craig Taylor, co-founder of Cyberhoot, a leading provider of phishing prevention solutions. Watch/listen as we discuss:

    • How hackers are going after session tokens to steal valuable credential data.
    • Why phishing prevention training spends too much time on avoiding the click instead of positive reinforcement of proper actions.
    • The need for worker training to go beyond any impact to the company, to the individual cyber risks as well.
    • How adding "friction" to email could be a solution.
    • The bad password advice that many high-level organizations continue to distribute.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Show More Show Less
    22 mins