logo
episode-header-image
Oct 2023
52m 37s

A look at a Whole-of-State cybersecurity...

N2K Networks
About this episode

Microsoft on the state of OT security. Israeli and Palestinian hacktivists target ICS. Coinmining as an (alleged, potential) front for espionage or stage for sabotage. EPA withdraws water system cybersecurity memorandum. Colonial Pipeline says new ransomware claims are due to unrelated third-party breach. Most organizations are struggling with IoT security. CISA views China as the top threat to US critical infrastructure. Improving security for open-source ICS software. CISA ICS advisories. Guest Kuldip Mohanty, CIO of North Dakota, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Kuldip shares how critical infrastructure is treated within the "Whole-of-State” cybersecurity strategy his team implements in North Dakota. On the Learning Lab, Mark Urban shares the first part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos’ Director of Intelligence Services.


Control Loop News Brief.

Microsoft on the state of OT security.

Microsoft Digital Defense Report 2023 (Microsoft)

Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities (aDolus)

Zero-days affect industrial routers.

10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows (Cisco Talos)

Israeli and Palestinian hacktivists target ICS.

Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews)

Coinmining as an (alleged, potential) front for espionage or stage for sabotage.

Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (The New York Times)

EPA withdraws water system cybersecurity memorandum.

EPA withdraws cyber audit requirement for water systems (Nextgov)

Colonial Pipeline says new ransomware claims are due to unrelated third-party breach.

Reports of second cyberattack on Colonial Pipeline false, company says (Fox 5 Atlanta)

Colonial Pipeline attributes ransomware claims to ‘unrelated’ third-party data breach (The Record)

Most organizations are struggling with IoT security.

New Global Survey Reveals 97% of Organizations Face Challenges Securing IoT and Connected Devices (Keyfactor)

Ransomware attack on Clorox.

Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg)

Clorox Warns of a Sales Mess After Cyberattack (The Wall Street Journal)

CISA views China as the top threat to US critical infrastructure.

China is top cyber threat to US utilities, other critical infrastructure: CISA (Utility Dive)

Improving security for open-source ICS software.

Improving Security of Open Source Software in Operational Technology and Industrial Control Systems (CISA)

CISA’s ICS advisories.

Mitsubishi Electric MELSEC-Q Series PLCs (Update A) (CISA)

CISA Releases Nineteen Industrial Control Systems Advisories (CISA)


Control Loop Interview.

Guest is Kuldip Mohanty, CIO of North Dakota, discussing how critical infrastructure is treated within the “whole of state” security strategy used in North Dakota.


Control Loop Learning Lab.

On the Learning Lab, Mark Urban is joined by Dragos’ Director of Intelligence Services, Paul Lukoskie, to examine cyber threat intelligence. 


Control Loop OT Cybersecurity Briefing.

A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Jun 2024
Digging into regulatory compliance issues.
UK will propose law to ban ransom payments for critical infrastructure entities. EPA outlines enforcement measures to protect water utilities against cyberattacks. Rockwell advises customers to disconnect ICS devices from the internet. Senator Vance asks CISA for information on V ... Show More
18m 23s
May 2024
Hacktivism targeting OT devices.
US Defense Department warns of Russian hacktivists targeting OT devices. The US government establishes safety and security board to advise the deployment of AI in critical infrastructure sectors. Vulnerabilities affect CyberPower UPS management software. US congressmen put forwar ... Show More
24m 36s
May 2024
Critical infrastructure: Pending legislation and risks and rewards from AI.
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to af ... Show More
24m 20s
Recommended Episodes
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
27m 2s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Sep 2024
UK’s newest cybersecurity MVPs.
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from ... Show More
28m 29s
Apr 2025
Former cybersecurity officials lose clearances.
Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large L ... Show More
26m 31s
Jan 2025
National security in the digital age.
A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a ... Show More
29m 20s
Nov 2024
War Room Best Practices
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, is joined by cybersecurity experts Kyle Wilhoit, Director of Threat Research, and Michal Goldstein, Director of Security Architecture and Research at Palo Alto Networks. Together, they exp ... Show More
35m 17s
Aug 26
Rolling the dice on cybersecurity.
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting e ... Show More
26m 30s