4.8 • 1K Ratings
🗓️ 14 August 2022
⏱️ 26 minutes
🧾️ Download transcript
"A CISO's Nightmare": Israel Baron on Railway Secuirty
Click on a timestamp to play from that location
0:00.0 | You can literally stop a train for emergency break in a matter of minutes. |
0:12.0 | Hi and welcome to Sabriason malicious life besides I'm Ren Leggman. A Cissosos nightmare, that's what Israel Barone, Israel Railway's first CISO ever, calls the current state of cyber security |
0:38.0 | in the world of railway transportation. |
0:41.0 | And not only in Israel. |
0:42.8 | According to Baron, railway systems all over the world are a mess of old systems built on top of older |
0:49.3 | systems, running ancient operating systems, and exposing their most sensitive inner workings to commuters via Wi-Fi. |
0:58.0 | To be honest, someone who takes the train to work every day, listening to Israel Baron made me a bit queasy. |
1:07.6 | Why are railway systems so difficult to defend and what are the most probable attack vectors against them? |
1:14.4 | Lait Nelson, our senior producer, spoke with Israel Barone, |
1:18.4 | who in his previous role served as a senior information security and technology officer at the Israeli Ministry of Defense. |
1:26.8 | That's it from corporations. |
1:42.0 | Not everybody thinks about... hackers stealing data from corporations. |
1:42.7 | Not everybody thinks about railways in terms of cyber security, so why do train systems need |
1:49.2 | to worry about cyber security in the first place? |
1:52.4 | If hackers want to cause high level of harm to a country, |
1:58.0 | like really hit the country, the nation's critical infrastructure, like to stop the country, like to jeopardize the daily lives of the citizens, |
2:12.0 | the railway or the transportation industry is a very good |
2:16.6 | and high level target because from one hand and I'm sure we're going to elaborate it later but it's so easy to hack it. |
2:28.4 | You know, it's so easy. |
2:30.9 | It doesn't take a lot of time and a lot of efforts because there are in most cases very, very old systems. |
2:39.0 | They were not designed to be safe against cyber attacks so they can do it in no time. |
2:48.8 | They can attack them. On the other end, the effect that such an attack can cause on the national level is huge because, for example, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.