Maritime Cybersecurity: Predictable = Hackable Podcast Por  arte de portada

Maritime Cybersecurity: Predictable = Hackable

Maritime Cybersecurity: Predictable = Hackable

Escúchala gratis

Ver detalles del espectáculo

OFERTA POR TIEMPO LIMITADO | Obtén 3 meses por US$0.99 al mes

$14.95/mes despues- se aplican términos.

You’re Port Control. A vessel requests entry.
No captain. No crew. Just autonomy.

In maritime cybersecurity, the risk isn’t that the ship is autonomous.
It’s that you no longer know who’s steering.

Lieuwe Jan Koning (Co-Founder & CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.

  • (00:05) - No captain, just code: the Port Control dilemma
  • (02:05:15) - Autonomous shipping is here - and it’s remote by design
  • (06:15:48) - When it crashes: who owns the blame (and the bill)?
  • (07:38:12) - Ready or not: why “keeping watch” breaks at sea
  • (10:12:49) - Predictable = steerable: the risks most teams miss
  • (13:49:46) - Visibility vs compromise: when the ship becomes a weapon
  • (18:46:10) - The mindset shift: from castles to constant compromise
  • (20:10:45) - Regulation gap: high impact, low control
  • (21:45:50) - Too late? Only if you stay blind to real threats
  • (01:50:19) - Stop splitting IT and OT: defend vessels like HQ
  • (05:19:42) - Put it on the agenda: ask better questions, run scenarios
  • (09:42:22) - Wrap: make it tangible, build security into autonomy

Key Topics Covered
• Why maritime cybersecurity now decides physical safety, not just data protection
• How predictability in autonomous vessels creates exploitable maritime cyber risk
• Where responsibility breaks down when humans leave the bridge
• What cyber attacks on critical infrastructure look like once they reach the sea
• What to do next to protect against cyber attacks at sea

Related ON2IT content & explicitly referenced resources
Before the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo
Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw
Threat Talks: https://threat-talks.com/
ON2IT (Zero Trust as a Service): https://on2it.net/
AMS-IX: https://www.ams-ix.net/ams

Threat Talks connects cyber threats to operational reality - every week.
Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.

Click here to view the episode transcript.

🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/

🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Todavía no hay opiniones