Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsEP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?
EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?
Cybersecurity

Cloud Security Podcast

EP257 Beyond the 'Kaboom': What Actually Breaks When OT Meets the Cloud?

Cloud Security Podcast
•January 5, 2026•29 min
0
Cloud Security Podcast•Jan 5, 2026

Key Takeaways

  • •OT systems now connect to cloud, eliminating traditional air gaps.
  • •Most OT breaches use standard IT tactics, not specialized malware.
  • •Hybrid cloud‑on‑prem designs boost resilience but introduce latency risks.
  • •Enterprise MITRE ATT&CK covers 99% of OT threat vectors.
  • •Red team remotely controlled locomotives, proving OT attack feasibility.

Pulse Analysis

The episode opens by debunking the myth of a permanent air gap for operational technology (OT). As manufacturers demand real‑time analytics and AI‑driven quality control, they push sensor data and control logic into public clouds. This shift replaces isolated serial links with serial‑to‑cloud converters, creating new exposure points whenever internet or ISP services falter. Engineers now grapple with hybrid architectures that blend on‑prem PLCs with cloud‑hosted supervisory systems, balancing low‑latency requirements against the scalability and security built into modern cloud platforms.

Listeners learn that the majority of OT compromises stem from conventional IT attack techniques rather than bespoke OT malware. Attackers target widely deployed Windows and Linux assets, using credential theft, living‑off‑the‑land binaries, and ransomware to pivot into engineering workstations. Because these footholds reside on familiar operating systems, the standard Enterprise MITRE ATT&CK framework already maps roughly 99% of the tactics, techniques, and procedures (TTPs) seen in OT incidents. The specialized MITRE ATT&CK for Industrial Control Systems (ICS) accounts for only a small fraction of real‑world cases, such as Stuxnet‑style exploits. Consequently, securing OT increasingly means applying proven IT controls—patch management, zero‑trust networking, and cloud‑native security services—while still respecting the physical safety constraints of industrial environments.

The conversation culminates with vivid red‑team demonstrations, including a remote takeover of a locomotive in a controlled test yard. Such exercises illustrate that once an attacker gains legitimate credentials, they can manipulate physical processes without custom malware. Effective detection therefore requires merging traditional engineering monitoring with security analytics, tuning alerts to the physics of each process. Cloud‑based SIEMs ingest SCADA logs, syslogs, and device telemetry, enabling rapid correlation and automated response. By adopting a hybrid cloud strategy, organizations gain faster recovery, threat‑agnostic visibility, and the ability to maintain on‑prem safety controls when connectivity is lost, positioning OT security on par with modern IT practices.

Episode Description

Subscribe at Spotify

Subscribe at Apple Podcasts

Subscribe at YouTube

          Guest:

        

      

Chris Sistrunk, Technical Leader, OT Consulting, Mandiant

Topics covered:

Resources:

Video version

Cybersecurity Forecast 2026 report by Google

Complex, hybrid manufacturing needs strong security. Here’s how CISOs can get it done blog

“Security Guidance for Cloud-Enabled Hybrid Operational Technology Networks” paper by Google Cloud Office of the CISO

DEF CON 23 - Chris Sistrunk - NSM 101 for ICS

MITRE ATT&CK for ICS

Our reflections on our podcast in 2025

Do you have something cool to share? Some questions? Let us know:

Web: 

            cloud.withgoogle.com/cloudsecurity/podcast

          

        

Mail: 

            cloudsecuritypodcast@google.com

          

        

Twitter: 

            @CloudSecPodcast

Show Notes

0

Comments

Want to join the conversation?

Loading comments...