logo
episode-header-image
Apr 2025
29m 25s

When Hackers Hijack Your Factory Floor

Boston Consulting Group BCG
About this episode

In the future, hackers will have many new vulnerabilities to exploit, especially as industries move from legacy IT to state-of-the-art digital systems. BCG’s Vanessa Lyon looks at how cyber-attacks are likely to evolve over the next ten years, and what business leaders need to do to protect their companies. This is critical, she explains, because governments are already moving to hold CEOs and other top executives personally accountable for cyberattacks on their companies. 

Learn More: 

Vanessa Lyon: https://on.bcg.com/4jmhN0M 

The Cyber Secure CEO: https://on.bcg.com/3Gq91QW 

What Cybersecurity Leaders Get Right: https://on.bcg.com/4iACrJk 

Cybersecurity Has a Talent Shortage. Here’s How to Close the Gap: https://on.bcg.com/445Ozi3 

BCG on Cybersecurity and Digital Risk: https://on.bcg.com/44advVG



This podcast uses the following third-party services for analysis:

Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp
Up next
Nov 12
The Future of Trade: How Will Multinational CEOs Succeed?
As regional trading blocs emerge, today’s multinational playbooks will become increasingly obsolete. Marc Gilbert, BCG’s Global Lead for its Center for Geopolitics, unpacks what every CEO needs to know to master the multi-polar world, from what winning looks like to navigating lo ... Show More
29m 19s
Oct 29
Force Multiplier or Co-Worker? Humans, AI, and the Future of Work
Many fear a future where huge swaths of the workforce are replaced by AI. But those concerns are based on a fundamental misunderstanding of how companies can best unlock AI's profit-boosting potential, says Julie Bedard, a Fellow at BCG Henderson Institute. Instead of replacing p ... Show More
34m 33s
Oct 15
Will You Buy a Car from a Chatbot?
Sponsored and boosted content is a reality of web searches these days, making it harder for consumers to find agnostic product recommendations. Consumers who want to cut to the chase will increasingly use LLMs. Chatbots can quickly comb the web to help consumers research products ... Show More
37m 21s
Recommended Episodes
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Dec 2024
Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration ... Show More
39m 17s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
27m 2s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Jun 2021
Role of Top Management in Cybersecurity Governance
The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability ... Show More
29m 47s
Jan 2025
Hacking the bureau.
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulne ... Show More
34m 16s
Apr 2025
545: CIA Hacker to Tech Entrepreneur: How Cybersecurity Can Make or Break Your Business
<p dir="ltr">From CIA hacker to cybersecurity advisor to a U.S. President.<br /> <br /> Now trusted by Fortune 500 companies, international banks, and leaders like Bill Gates.<br /> <br /> (And he almost missed the CIA meeting... because it was raining.)<br /> <br /> "Something t ... Show More
54m 49s
Nov 2024
Cyber Espionage and Financial Crime: North Korea’s Double Threat
In this episode of Threat Vector, host David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dahan, a cybersecurity expert with over 18 years of experience, discusses the nation's str ... Show More
33m 28s