
Cyber Things The Unseen World
6 snips
Nov 17, 2025 In this engaging discussion, Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis, dives into the complex world of operational technology security. He highlights the alarming surge in cyberattacks targeting critical infrastructure by 2025 and emphasizes the necessity of device visibility to thwart these threats. Using analogies from Stranger Things, Kam explains the concept of attack paths and how AI is reshaping adversarial tactics. The importance of collaboration and continuous monitoring is underscored as essential strategies for proactive defense.
AI Snips
Chapters
Transcript
Episode notes
IT/OT Convergence Widens Attack Surface
- Digital convergence expands attack surfaces as OT devices become IP-connected and reachable from IT networks.
- That shift turns previously isolated operational devices into potential entry points for large-scale attacks.
Bring IT And OT Teams Together
- Sit IT and OT teams in the same room to map networks, identify devices, and find hidden pivots.
- Start continuous visibility, vulnerability management, and monitoring as phased steps: crawl, walk, run.
One Compromised Device Can Trigger Cascades
- Use the Stranger Things analogy: the Internet is the 'Mother Gate' and advanced threats are a central 'mind flayer' controlling simpler attackers.
- Single exploited devices can become pivot points that recruit further compromise across OT environments.
