Cloud Security Podcast
The episode opens by debunking the myth of a permanent air gap for operational technology (OT). As manufacturers demand real‑time analytics and AI‑driven quality control, they push sensor data and control logic into public clouds. This shift replaces isolated serial links with serial‑to‑cloud converters, creating new exposure points whenever internet or ISP services falter. Engineers now grapple with hybrid architectures that blend on‑prem PLCs with cloud‑hosted supervisory systems, balancing low‑latency requirements against the scalability and security built into modern cloud platforms.
Listeners learn that the majority of OT compromises stem from conventional IT attack techniques rather than bespoke OT malware. Attackers target widely deployed Windows and Linux assets, using credential theft, living‑off‑the‑land binaries, and ransomware to pivot into engineering workstations. Because these footholds reside on familiar operating systems, the standard Enterprise MITRE ATT&CK framework already maps roughly 99% of the tactics, techniques, and procedures (TTPs) seen in OT incidents. The specialized MITRE ATT&CK for Industrial Control Systems (ICS) accounts for only a small fraction of real‑world cases, such as Stuxnet‑style exploits. Consequently, securing OT increasingly means applying proven IT controls—patch management, zero‑trust networking, and cloud‑native security services—while still respecting the physical safety constraints of industrial environments.
The conversation culminates with vivid red‑team demonstrations, including a remote takeover of a locomotive in a controlled test yard. Such exercises illustrate that once an attacker gains legitimate credentials, they can manipulate physical processes without custom malware. Effective detection therefore requires merging traditional engineering monitoring with security analytics, tuning alerts to the physics of each process. Cloud‑based SIEMs ingest SCADA logs, syslogs, and device telemetry, enabling rapid correlation and automated response. By adopting a hybrid cloud strategy, organizations gain faster recovery, threat‑agnostic visibility, and the ability to maintain on‑prem safety controls when connectivity is lost, positioning OT security on par with modern IT practices.
Subscribe at Spotify
Subscribe at Apple Podcasts
Subscribe at YouTube
Guest:
Chris Sistrunk, Technical Leader, OT Consulting, Mandiant
Topics covered:
Resources:
Video version
Cybersecurity Forecast 2026 report by Google
Complex, hybrid manufacturing needs strong security. Here’s how CISOs can get it done blog
“Security Guidance for Cloud-Enabled Hybrid Operational Technology Networks” paper by Google Cloud Office of the CISO
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS
MITRE ATT&CK for ICS
Our reflections on our podcast in 2025
Do you have something cool to share? Some questions? Let us know:
Web:
cloud.withgoogle.com/cloudsecurity/podcast
Mail:
cloudsecuritypodcast@google.com
Twitter:
@CloudSecPodcast
Comments
Want to join the conversation?
Loading comments...