In this episode of the Security Breach podcast from Manufacturing.net, Phosphorus CISO John Terrill offers his take on ransomware, as well as a few other things, like…
- How hackers use replicable toolkits to move from victim to victim in the industrial sector
- How those in cyber defense need to take a similar approach to hackers
- A preference for homegrown OT security expertise
- Remembering that non-OT systems, like HVAC systems or elevators, can be roads into industrial control systems
- Needing to look at OT assets like computers, not just machines
- And plenty more!
New to the Security Breach podcast? Here’s what it’s all about.
Regardless of what you might hear, supply chain disruptions, labor challenges and low-cost foreign competition are not the biggest threats to U.S. manufacturers. Ransomware gangs, phishing schemes, and IP theft now top this list.
Thatโs why the Security Breach podcast, hosted by Jeff Reinke, takes these hackers to task, examining how groups like REvil, Darkside, and Wicked Panda are able to organize their attacks and how the industrial sector can protect themselves against tools like Cobalt Strike and Raspberry Robin.