
The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
Episode: The Striker Attack: What It Reveals About OT Cybersecurity and Why Tabletop Exercises Matter
Pub date: 2026-03-23
Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization
Cyberattacks don’t just test your systems - they test your preparedness.
In this episode of Protect It All, host Aaron Crow breaks down key lessons from the Striker attack and what it reveals about today’s evolving threat landscape across IT and OT environments. From energy and healthcare to manufacturing systems, attackers are increasingly using sophisticated techniques like “living off the land” - blending into normal operations instead of deploying obvious malware.
Aaron takes this beyond theory, focusing on what organizations must do before an attack happens.
A major theme? Tabletop exercises. Not as a compliance activity - but as a critical tool for building real incident response readiness, improving team coordination, and exposing gaps that tools alone can’t catch.
You’ll learn:
- What the Striker attack teaches about modern cyber warfare
- How living-off-the-land tactics bypass traditional defenses
- Why tabletop exercises are essential for real-world readiness
- The role of threat hunting and collaboration across teams
- How attackers exploit weaknesses in both IT and OT environments
- Why small, consistent actions can dramatically improve resilience
Whether you’re defending critical infrastructure, leading a cyber team, or just starting your security journey, this episode delivers practical insights you can apply immediately.
Tune in to learn how to prepare before the next attack - not react after it - only on Protect It All.
Key Moments:
04:59 "Modern Warfare: Cyber and Beyond"
08:47 "Security Risks of Remote Wipe"
10:31 "Living Off the Land Tactics"
13:11 "Balancing Power and Security"
19:12 "Vulnerabilities Demand Swift Action"
20:21 Prioritize Risk, Justify Investment
25:04 Practice Preparedness Before Crisis
26:48 Weak Links Threaten Cybersecurity
Connect With Aaron Crow:
- Website: www.corvosec.com
- LinkedIn: https://www.linkedin.com/in/aaronccrow
Learn more about PrOTect IT All:
- Email: [email protected]
- Website: https://protectitall.co/
- X: https://twitter.com/protectitall
- YouTube: https://www.youtube.com/@PrOTectITAll
- FaceBook: https://facebook.com/protectitallpodcast
To be a guest or suggest a guest/episode, please email us at [email protected]
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Więcej odcinków z kanału "@BEERISAC: OT/ICS Security Podcast Playlist"



Nie przegap odcinka z kanału “@BEERISAC: OT/ICS Security Podcast Playlist”! Subskrybuj bezpłatnie w aplikacji GetPodcast.








