52 episodes

Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.

Control Loop: The OT Cybersecurity Podcast N2K Networks

    • Technology

Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.

    Critical infrastructure: Pending legislation and risks and rewards from AI.

    Critical infrastructure: Pending legislation and risks and rewards from AI.

    Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to affect critical infrastructure, as well as the Department of Energy’s assessment of the potential risks and rewards from AI. The Learning Lab is on a hiatus this episode, and will be returning soon!

    Control Loop News Brief.
    Mandiant ties OT attacks to Sandworm.
    Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm (Mandiant)
    Russia-linked hackers target Texas water facilities.
    Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow (SecurityWeek)
    Russia-linked hacking group suspected of carrying out cyberattack on Texas water facility, cybersecurity firm says (CNN)
    Belarusian hacktivists hit fertilizer company.
    Belarusian hackers claim to breach fertilizer plant in retaliation for support of Lukashenko regime (The Record)
    CISA issues eight ICS advisories.
    CISA Releases Eight Industrial Control Systems Advisories (CISA)

    Control Loop Interview.
    Host Dave Bittner and his co host from the Caveat podcast on the N2K CyberWire network, Ben Yelin, share some discussion about pending legislation with potential to affect critical infrastructure, and Department of Energy’s assessment of the potential risks and rewards from AI.
    Links to articles: 


    Crawford puts forward bill on cybersecurity risks to water systems (The Arkansas Democrat-Gazette)


    US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure (Industrial Cyber) 


    Control Loop Learning Lab.
    The Learning Lab is on a break and will be back soon. Stay tuned. 

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. It’s only 5 short questions. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 23 min
    Examining CIRCIA and VOLTZITE.

    Examining CIRCIA and VOLTZITE.

    Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior Director Government Affairs at Dragos, talks about the Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA). The Learning Lab returns has part 2 of Mark Urban and Josh Hanrahan's discussion adversary hunting and VOLTZITE (aka Volt Typhoon).

    Control Loop News Brief.
    Chinese-manufactured devices in US networks see a 41% YoY increase.
    “All your base are belong to us” – A probe into Chinese-connected devices in US networks (Forescout)
    Ukraine-linked hackers deploy ICS malware against Russian infrastructure company.
    Unpacking the Blackjack Group's Fuxnet Malware (Claroty)
    A look at cyberattacks that had physical consequences in 2023.
    2024 Threat Report – OT Cyberattacks with Physical Consequences (Waterfall)
    Lessons from NERC’s GridEx exercise.
    GridEx VII: Lessons Learned Report (NERC)
    Extension requested for comment period on CISA’s incident reporting rule.
    US Chamber of Commerce, industry groups call for 30-day delay in CIRCIA rules (The Record)

    Control Loop Interview.
    Guest Kate Ledesma, Senior Director Government Affairs at Dragos, discussing Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA). 

    Control Loop Learning Lab.
    On the Learning Lab segment, listen to Dragos’ Mark Urban talking with Josh Hanrahan, Principal Adversary Hunter at Dragos, in part two of their discussion on adversary hunting and VOLTZITE (aka Volt Typhoon). 
    Resources:
    VOLTZITE Threat Group’s Under the Radar Cyber Espionage on U.S. Critical Systems.
    The 5 Critical Controls for ICS/OT Cybersecurity – SANS webinar.

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. It’s only 5 short questions. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 46 min
    Hunting adversaries.

    Hunting adversaries.

    Sellafield nuclear waste site to be prosecuted for alleged cybersecurity failings. CISA issues draft proposal for cyber incident reporting by critical infrastructure entities. Threat actor targets Indian government and energy entities. Suspicious NuGet package appears to target developers in the industrial sector. Guest Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, shares their CIRCIA Notice of Proposed Rulemaking. The Learning Lab returns! Mark Urban and Josh Hanrahan discuss adversary hunting.

    Control Loop News Brief.
    Sellafield nuclear waste site to be prosecuted for alleged cybersecurity failings.
    Sellafield nuclear waste dump to be prosecuted for alleged cybersecurity offences (The Guardian)
    Sellafield nuclear site hacked by groups linked to Russia and China (The Guardian)
    CISA issues draft proposal for cyber incident reporting by critical infrastructure entities.
    CISA releases draft rule for cyber incident reporting (CyberScoop)
    Threat actor targets Indian government and energy entities.
    Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
    Suspicious NuGet package appears to target developers in the industrial sector.
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)

    Control Loop Interview.
    Guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA. Eric shares their CIRCIA Notice of Proposed Rulemaking that goes into effect this week.

    Control Loop Learning Lab.
    The Learning Lab is back! On today’s segment, listen to Dragos’ Mark Urban talking with Josh Hanrahan, Principal Adversary Hunter at Dragos, in part one of their discussion on adversary hunting and VOLTZITE (aka Volt Typhoon). 
    Resources:

    VOLTZITE Threat Group’s Under the Radar Cyber Espionage on U.S. Critical Systems . 

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 33 min
    Navigating China's infrastructure risks in the energy sector.

    Navigating China's infrastructure risks in the energy sector.

    Researchers discover a way to hijack web-based PLCs. Threat actor targets manufacturing entities in North America. US Department of Defense launches CORA program. CISA issues ICS advisories. Guest Aura Sabadus, Senior Journalist at ICIS, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential attacks on critical infrastructure and what the energy industry is saying about these risks. The Learning Lab is taking a break and will return soon. Stay tuned.

    Control Loop News Brief.
    Researchers discover a way to hijack web-based PLCs.
    Critical Infrastructure Systems Are Vulnerable to a New Kind of Cyberattack (Georgia Tech)
    Threat actor targets manufacturing entities in North America.
    Blind Eagle's North American Journey (eSentire)
    APT-C-36 Updates Its Spam Campaign Against South American Entities With Commodity RATs (Trend Micro)
    US Department of Defense launches CORA program.
    JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program (US Department of Defense)
    CISA issues ICS advisories.
    CISA Releases Fifteen Industrial Control Systems Advisories (CISA)

    Control Loop Interview.
    Guest Aura Sabadus, Senior Journalist at ICIS, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential attacks on critical infrastructure and what the energy industry is saying about these risks.

    Control Loop Learning Lab.
    The Learning Lab is on break and will return in the near future. Stay tuned.

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 28 min
    Addressing maritime cyber threats.

    Addressing maritime cyber threats.

    NIST releases Cybersecurity Framework 2.0. Biden administration issues executive order on maritime cybersecurity. Suspected Chinese threat actor continues to exploit Ivanti vulnerabilities. ThyssenKrupp sustains ransomware attack. Guests Liz Martin, Global Advisory Solution Architect at Dragos, and Blake Benson, Senior Director at ABS Group, talk through the latest Maritime Executive Order. The Learning Lab is taking a break and will return soon. Stay tuned.

    Control Loop News Brief.
    NIST releases Cybersecurity Framework 2.0.
    NIST Releases Version 2.0 of Landmark Cybersecurity Framework (NIST)
    Biden administration issues executive order on maritime cybersecurity.
    On-the-Record Press Call on the Biden-⁠Harris Administration Initiative to Bolster the Cybersecurity of U.S. Ports (The White House)
    Biden to sign executive order on US port cybersecurity targeting Chinese-manufactured shipping cranes (CNBC)
    Suspected Chinese threat actor continues to exploit Ivanti vulnerabilities.
    Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts (Mandiant)
    ThyssenKrupp sustains ransomware attack.
    German Steelmaker Thyssenkrupp Confirms Ransomware Attack (SecurityWeek)

    Control Loop Interview.
    Guests Liz Martin, Global Advisory Solution Architect at Dragos, and Blake Benson, Senior Director at ABS Group, talk through the latest Maritime Executive Order. For more information, review the Executive Order on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States and White House’s FACT SHEET: Biden-⁠Harris Administration Announces Initiative to Bolster Cybersecurity of U.S. Ports. 

    Control Loop Learning Lab.
    The Learning Lab is on break and will return in the near future. Stay tuned.

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 28 min
    Volt Typhoon and the Year in Review.

    Volt Typhoon and the Year in Review.

    Five Eyes publish report on Volt Typhoon. Volt Typhoon targets emergency management services in the US. Siemens and Schneider Electric issue patches. Guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, sharing the findings of Dragos Cybersecurity Year in Review report. The Learning Lab segment will return next episode.

    Control Loop News Brief.
    Five Eyes publish report on Volt Typhoon.
    PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure (CISA)
    Volt Typhoon targets emergency management services in the US.
    VOLTZITE Espionage Operations Targeting U.S. Critical Systems (Dragos)
    Siemens and Schneider Electric issue patches.
    ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities (SecurityWeek)

    Control Loop Interview.
    Guest Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. You can download a copy of the report here. 

    Control Loop Learning Lab.
    The Learning Lab segment will return next episode.

    Control Loop Audience Survey.
    Please take a moment to fill out our super quick survey. Thanks!

    Control Loop OT Cybersecurity Briefing.
    A companion monthly newsletter is available through free subscription and on N2K Networks website.

    • 30 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
TED Tech
TED Tech
The MxU Podcast
MxU
Today in iOS  - The Unofficial iPhone, iPad, and Apple Watch Podcast
Rob @ podCast411 and Part of the podcast411network
Darknet Diaries
Jack Rhysider
Made by Google Podcast
Google

You Might Also Like

CyberWire Daily
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Hacking Humans
N2K Networks
Defense in Depth
David Spark
Cyber Security Headlines
CISO Series
Smashing Security
Graham Cluley & Carole Theriault