Sveriges mest populära poddar

@BEERISAC: OT/ICS Security Podcast Playlist

Examining CIRCIA and VOLTZITE.

46 min • 17 april 2024
Podcast: Control Loop: The OT Cybersecurity Podcast (LS 35 · TOP 3% what is this?)
Episode: Examining CIRCIA and VOLTZITE.
Pub date: 2024-04-17

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior Director Government Affairs at Dragos, talks about the Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA). The Learning Lab returns has part 2 of Mark Urban and Josh Hanrahan's discussion adversary hunting and VOLTZITE (aka Volt Typhoon).


Control Loop News Brief.

Chinese-manufactured devices in US networks see a 41% YoY increase.

“All your base are belong to us” – A probe into Chinese-connected devices in US networks (Forescout)

Ukraine-linked hackers deploy ICS malware against Russian infrastructure company.

Unpacking the Blackjack Group's Fuxnet Malware (Claroty)

A look at cyberattacks that had physical consequences in 2023.

2024 Threat Report – OT Cyberattacks with Physical Consequences (Waterfall)

Lessons from NERC’s GridEx exercise.

GridEx VII: Lessons Learned Report (NERC)

Extension requested for comment period on CISA’s incident reporting rule.

US Chamber of Commerce, industry groups call for 30-day delay in CIRCIA rules (The Record)


Control Loop Interview.

Guest Kate Ledesma, Senior Director Government Affairs at Dragos, discussing Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA)


Control Loop Learning Lab.

On the Learning Lab segment, listen to Dragos’ Mark Urban talking with Josh Hanrahan, Principal Adversary Hunter at Dragos, in part two of their discussion on adversary hunting and VOLTZITE (aka Volt Typhoon). 

Resources:

VOLTZITE Threat Group’s Under the Radar Cyber Espionage on U.S. Critical Systems.

The 5 Critical Controls for ICS/OT Cybersecurity – SANS webinar.


Control Loop Audience Survey.

Please take a moment to fill out our super quick survey. It’s only 5 short questions. Thanks!


Control Loop OT Cybersecurity Briefing.

A companion monthly newsletter is available through free subscription and on N2K Networks website.



The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Förekommer på
00:00 -00:00