Threat Talks - Your Gateway to Cybersecurity Insights Podcast Por Threat Talks arte de portada

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks - Your Gateway to Cybersecurity Insights

De: Threat Talks
Escúchala gratis

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!Threat Talks Política y Gobierno
Episodios
  • Zero Trust: From Revolution to Reality
    Mar 10 2026

    Zero Trust is easy to say. Hard to execute.

    Most organizations try to build it themselves.

    Most underestimate the complexity.
    Most get stuck in architecture diagrams instead of protecting what actually matters: data.


    If execution determines success – should you really be doing it alone?


    In this episode of Threat Talks, Lieuwe Jan Koning, Co-Founder and CTO at ON2IT Cybersecurity, sits down with Dr. Chase Cunningham, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust really requires in practice – not in theory.

    Zero Trust isn’t a product. It’s not a checkbox.

    It’s a decision about what you protect first – and how seriously you take execution.

    If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.


    Because in the end, Zero Trust doesn’t fail on strategy.
    It fails on execution.

    Timestamps

    00:00 – Introduction to Zero Trust Data Protection

    00:50 – How Zero Trust Started at Forrester

    03:19 – The ZTX Framework and Structuring Zero Trust

    05:05 – Data at the Core of Zero Trust Data Protection

    08:22 – Success Factors for Effective Zero Trust Data Protection

    13:06 – Why Most Organizations Should Not DIY Zero Trust

    15:36 – Breaches, Misconfiguration, and Market Reality

    18:07 – How COVID Accelerated Zero Trust Adoption

    19:25 – Closing Thoughts on Zero Trust Fundamentals

    Key Topics Covered

    · Where Zero Trust actually started – and how it evolved beyond network segmentation

    · The shift from perimeter thinking to data-first protection

    · Why most internal Zero Trust programs stall

    · The operational discipline required to make Zero Trust work

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams

    · Threat Talks playlist on Zero Trust: https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g

    · Zero Trust Dictionary: https://on2it.net/resources/zero-trust-dictionary/


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    Más Menos
    20 m
  • China is Already Inside your infrastructure
    Mar 3 2026

    China is Already Inside your infrastructure.

    And the EU is done ignoring it.

    In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, Bart Groothuis, MEP, joins Lieuwe-Jan Koning, CTO and Co-Founder, to explain why vendor dependency is now a board-level security risk.

    Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.

    This isn’t about secret backdoors.

    It’s about who controls the next update.
    Who enters your data center.
    And who can one day - switch off the grid.

    The revision brings non-technical risk - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means supply chain risk is no longer theoretical. It’s regulatory.


    And the impact goes far beyond telecom.
    Energy. Cloud. Transport. Enterprise IT.

    If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.

    Timestamps
    00:00 Opening & guest intro: MEP Bart Roos - rapporteur on EU legislation
    01:23 What the CSA revision targets - certification, telecoms, cloud
    09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications
    15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model

    17:17 Energy, inverters, and real-world dependency risks - blackouts
    21:53 What organisations & buyers should do now (roadmaps, phasing out risk)
    25:53 Final call to action & closing

    Key Topics Covered
    • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.
    • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).
    • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.
    • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.

    Related ON2IT content & explicitly referenced resources
    ON2IT website: https://on2it.net/
    Threat Talks website: https://threat-talks.com/
    European Commission - Cybersecurity Act overview: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act
    Proposal for a Regulation for the EU Cybersecurity Act: https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act

    Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.
    ► YOUTUBE: /@threattalks
    ► Spotify / Apple Podcasts:

    Más Menos
    30 m
  • OpenClaw and The Dark Side of Agentic AI
    Feb 24 2026

    Your biggest threat this year isn’t malware. It’s your own AI assistant.

    OpenClaw connects an LLM directly to your terminal, browser, email, and chat.
    It runs with your permissions.
    It executes tasks without hesitation.

    Days after launch, researchers found a One-Click RCE.

    Cisco called it a security nightmare.

    Gartner called it an unacceptable risk.

    OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.

    The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?

    In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.

    OpenClaw is powerful. It’s useful.

    It’s also proof that many of us are not ready for AI agents with this level of autonomy.

    Before you let an AI agent into your systems, understand what happens when it runs unchecked.

    Timestamps

    Key Topics Covered

    · How OpenClaw works and why agentic AI changes the security model

    · The One-Click RCE and what it reveals about AI agent security

    · Malicious skills, default allow design, and autonomous privilege abuse

    · Realistic mitigation strategies including sandboxing and controlled environments

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.


    Click here to view the episode transcript.

    🔔 Follow and Support our channel! 🔔

    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Más Menos
    20 m
Todavía no hay opiniones