ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Hack the Boat: Maritime Cybersecurity Threats to Critical Infrastructure | The Cybersecurity Podcast

Автор: Threat Talks

Загружено: 2024-10-08

Просмотров: 774

Описание: What happens when a vessel becomes a floating data center—with no firewall in sight?
Threat Talks host Lieuwe Jan Koning boards the Damen Shipyards simulator with Hans Quivooij (Global CISO, Damen Shipyards) and Luca Cipriano (Threat Intel Specialist, ON2IT) to explore the harsh new reality of maritime cybersecurity.

From spoofed AIS signals to hacked ballast systems, the stakes aren’t just financial—they’re geopolitical, operational, and life-threatening.
This isn’t science fiction. It’s happening now.

Timestamps
00:00 Cyber Attack at Sea – Intro
00:34 Damen Shipyards CISO Interview
01:45 Rising Maritime Cyber Threats 2025
10:57 “Hack-the-Boat” Ballast System Demo
18:36 Engine Hijack & OT Exploits
22:28 AIS Spoofing, Pirates & GPS Tricks
26:15 Zero-Trust Security for Ships

Key Topics Covered
• Critical infrastructure cybersecurity in the maritime sector: how ships became cyber targets
• Maritime cybersecurity vulnerabilities, from AIS spoofing to propulsion engine attacks
• How shipbuilders like Damen are embedding cybersecurity into vessel design
• What Zero Trust and microsegmentation look like at sea

Stay Ahead in Cybersecurity
If you care about securing critical infrastructure—whether it floats or not—subscribe to Threat Talks and click the bell icon to catch new episodes every Tuesday.

Got feedback or want to join a hack simulation? Email us at [email protected]
🔔 Hit the bell & never miss an episode!

===
► YOUTUBE:    / @threattalks  
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/hack-the-boat/

🗺️ Explore the Hack's Route in Detail 🗺️
https://on2it.s3.amazonaws.com/202410...

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

#cybersecurityexperts #maritimesecurity #ThreatTalks #techsafety #navalengineering #naval

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Hack the Boat: Maritime Cybersecurity Threats to Critical Infrastructure | The Cybersecurity Podcast

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

🔥[Belyaev_Podcast]🔥 - Выпуск №13 «OSINT 3.0: Золотая запись на каждого и конец анонимности»

🔥[Belyaev_Podcast]🔥 - Выпуск №13 «OSINT 3.0: Золотая запись на каждого и конец анонимности»

Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

BIO298 23WI HibernationStudy

BIO298 23WI HibernationStudy

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Сумеет ли Дуров обойти блокировку «Телеграма»?

Сумеет ли Дуров обойти блокировку «Телеграма»?

Cyber Security - Maritime

Cyber Security - Maritime

ШУЛЬМАН: новая мобилизация, уход Путина, смута. Чебурнет. Большое интервью / МОЖЕМ ОБЪЯСНИТЬ

ШУЛЬМАН: новая мобилизация, уход Путина, смута. Чебурнет. Большое интервью / МОЖЕМ ОБЪЯСНИТЬ

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast

Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast

Enterprise AI Unlocked - Episode 7 - 56% of Companies Are Getting Nothing From AI.

Enterprise AI Unlocked - Episode 7 - 56% of Companies Are Getting Nothing From AI.

I Hacked This Temu Router. What I Found Should Be Illegal.

I Hacked This Temu Router. What I Found Should Be Illegal.

Best Hacking Podcast in the world?

Best Hacking Podcast in the world?

Can't deny DDoS in 2024? - Threat Talks Cybersecurity Podcast

Can't deny DDoS in 2024? - Threat Talks Cybersecurity Podcast

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Как (не) скрыться от ФСБ. Анонимность Мориарти

Как (не) скрыться от ФСБ. Анонимность Мориарти

Human Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSprings

Human Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSprings

ЦЕНА ОШИБКИ: 13 Инженерных Катастроф, Которые Потрясли Мир!

ЦЕНА ОШИБКИ: 13 Инженерных Катастроф, Которые Потрясли Мир!

Securitize Founder Carlos Domingo: Tokenizing Real Assets, BlackRock BUIDL, and Going Public

Securitize Founder Carlos Domingo: Tokenizing Real Assets, BlackRock BUIDL, and Going Public

The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

“Security Is An Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers

“Security Is An Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]