logo
episode-header-image
Apr 30
29m 25s

When Hackers Hijack Your Factory Floor

Boston Consulting Group BCG
About this episode

In the future, hackers will have many new vulnerabilities to exploit, especially as industries move from legacy IT to state-of-the-art digital systems. BCG’s Vanessa Lyon looks at how cyber-attacks are likely to evolve over the next ten years, and what business leaders need to do to protect their companies. This is critical, she explains, because governments are already moving to hold CEOs and other top executives personally accountable for cyberattacks on their companies. 

Learn More: 

Vanessa Lyon: https://on.bcg.com/4jmhN0M 

The Cyber Secure CEO: https://on.bcg.com/3Gq91QW 

What Cybersecurity Leaders Get Right: https://on.bcg.com/4iACrJk 

Cybersecurity Has a Talent Shortage. Here’s How to Close the Gap: https://on.bcg.com/445Ozi3 

BCG on Cybersecurity and Digital Risk: https://on.bcg.com/44advVG



This podcast uses the following third-party services for analysis:

Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp
Up next
Yesterday
BCG Presents: In Her Ellement
What can ancient Greek myths teach us about modern leadership? Kirsten Rulf has spent her career at the intersection of tech, policy, and public service. In this episode, Kirsten shares how she found clarity in moments of uncertainty, why AI presents a major opportunity for the p ... Show More
27m 21s
Jun 25
Hang Up and Hang Out: AI Agents Give Us a Phone-Free Future
Apps were supposed to make life easier to navigate, but they often create more complexity. Planning a trip can involve hundreds of digital touchpoints over several months. But new advances–especially the growth of AI agents–coupled with ambient and voice-recognition technology, c ... Show More
30 m
Jun 11
Will AI Finally Defeat Chronic Diseases Like Alzheimer’s?
The pharmaceutical industry has yet to develop highly effective treatments for common chronic and neurological issues, like Alzheimer’s and cardiovascular disease. But GenAI promises to accelerate the discovery and development of breakthrough treatments. BCG’s Priya Chandran expl ... Show More
28m 43s
Recommended Episodes
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Jun 2021
Role of Top Management in Cybersecurity Governance
The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability ... Show More
29m 47s
Jan 2025
Hacking the bureau.
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulne ... Show More
40m 16s
Nov 2024
Cyber Espionage and Financial Crime: North Korea’s Double Threat
In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's str ... Show More
33m 28s
May 28
Fingers point east.
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender webs ... Show More
34m 47s
Jan 2025
When retaliation turns digital.
New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS i ... Show More
33m 29s