From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.
In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.
Key topics they tackle:
🛳️ Why are modern ships, airports, hospitals and even cities targeted?
🛡️ What makes OT so hard to secure compared to IT?
✈ What do real-world OT threats look like and how can we defend against them?
If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.
Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business.
In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.
In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface.
They explore:
✅ Methods for defining protect surfaces
⛨ Establishing the relevance of each protect surface
📈 How to align your cybersecurity with business needs and goals
In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key.
Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing?
In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools.
They discuss:
✅ Why Zero Trust isn’t a product, and what it actually is
🗺️ The five steps and four core principles of Zero Trust
🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation
They debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.
What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.
In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be.
💨 What makes “low and slow” attacks so hard to detect?
🔧 How do living-off-the-land tactics help attackers blend in?
📉 What motivations do threat actors like Volt Typhoon have?
Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode.
Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.
In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.
Key questions answered in this Deep Dive:
🕶️ What are dark markets, and how do they work?
🔑 How do cybercriminals (or intrepid researchers) access these dark markets?
🎬 How is cybercrime becoming as accessible as a streaming service?
⚠️ What risks do businesses face from dark markets?
🔎 What role does threat intelligence plays in monitoring these markets?
With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves.
The Dark Web Economy: Hacks for $10?
Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving.
💰 How much is YOUR data worth on the dark web?
🚨What’s for sale—and who’s buying?
🛒 How is hacking becoming a subscription-based service?
Cybercriminals operate like well-run businesses, offering hacking tools, stolen credentials, and even customer support. But if cybercrime is getting more sophisticated, what can individuals and businesses do to fight back?
⏳ What happens when time goeswrong?
Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches.
In this episode of ThreatTalks, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss:
· How does time impact cybersecurity, and whathappens when it drifts?
· Why is NTP no longer sufficient for high-speeddigital transactions?
· How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?
· Could time manipulation be an attack vector,and how do organizations mitigate this risk?
From financialtransactions to forensic log analysis, knowing exactly when an eventoccurs can make or break an organization’s security posture.
Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity.
Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.
Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity.
Despite decades of talk about intelligence sharing, most information is still exchanged manually, often via spreadsheets. As Howard points out, a true global threat-sharing framework could give defenders the upper hand.
Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.
👕 Receive your Threat Talks T-shirt via https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity?
In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity.
❓What’s the difference between cybersecurity strategy and tactics?
❓How come some random geezers are better at cybersecurity forecastingthan industry pros?
❓Is resilience the ultimate cybersecurity strategy?
❓Why does Rick Howard think Zero Trust is a passive strategy?
And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time?
Rick Howard’s Cybersecurity Canon has gotyou covered: https://icdt.osu.edu/about-cybersecurity-canon
👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🚨 Can you still trust what you see? 🚨
Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time.
In this episode of Threat Talks, we explore how deepfake scams have already cost companies millions.
From CEO voice fraud to bypassing identity checks, the risks are rising.
👥 How do deepfakes work?
👥 What makes them so dangerous?
👥 How can organizations protect themselves?
Join host Rob Maas and ON2IT SOC analyst Yuri Wit as they break down the latest deepfake threats and what you can do to stay ahead.
👕 Receive your Threat Talks T-shirt https://threat-talks.com/🗺️ Explore the Hack's Route in Detail
🗺️https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.
In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:
🎯 Key Takeaways
🛡 Data minimization and post-quantum cryptographic algorithms are essential.
📈 Start planning your migration strategy now.
🚨 Don’t procrastinate – quantum computing is coming sooner than you think.
💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.
📢 Like, Subscribe & Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/post-quantum-threat-to-encryption/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🔒 Are endpoint protection solutions enough to safeguard your organization?
In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.
Learn✅ The differences between AVs, EDRs, and XDRs
✅ Common bypass techniques used by attackers
✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy
💡 Key Insights
📩 Have questions or thoughts?
Reach out at team@threat-talks.com!
🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.
📌 What You’ll Learn:
With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.
🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday! === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/inside-the-hackers-mind/
🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers
A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?
In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.
🔍 What you’ll learn:
This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.
Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.
🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
ONCD: The Cyber Catalyst with Davis Hake
How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.
👾 The ONCD’s mission and its role in U.S. cybersecurity.
👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.
👾 Why global collaboration is key to countering modern threats.
Watch now to uncover how governments and businesses can work together to secure the digital future.
🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/oncd-the-cyber-catalyst/ 🗺️ Explore 2024's Hack's Routes in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
The State of Cybersecurity in the European Union
Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.
📌 Topics covered
🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.
👉 Don’t forget to like, subscribe, and share to help us spread the word!
2025: The Year of AI and Cybersecurity Evolution
Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.
🚀 What’s inside this episode?
🔹 A sneak peek into AI advancements: Could we see virtual CEOs?
🔹 The rise of Zero Trust supply chain strategies.
🔹 Navigating the skills gap in an evolving digital world.
🔹 AI in cybersecurity: Opportunities, risks, and where to focus.
🔹 Power consumption and sustainability in AI’s rapid growth.
AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate.
Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/ 🗺️ Explore all 2024's Hack's in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned. In this Threat Talk, we: 👾 Look back at the major trends and threats of 2024. 👾 Discuss how organizations adapted to an ever-changing security landscape. 👾 Highlight key moments from Threat Talks throughout the year. Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss! 🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks. 👉Best way to support the channel: give us a like! 🎧 Available on all major podcast platforms. ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/2024-the-breaking-point/
🗺️ Explore all 2024's infographics 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach. 👉Best way to support the channel: give us a like! 🎧 Available on all major podcast platforms. ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX