OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with T...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=BGxxacL3Fc4



Duration: 0:00
0 views
0


⬥GUEST⬥


Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/


⬥HOST⬥


Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com/


⬥EPISODE NOTES⬥


Business continuity planning is a familiar exercise for most IT and security leaders—but when you move into operational technology (OT), the rules change. In this episode of Redefining CyberSecurity, Sean Martin talks with Tobias Halmans, an incident responder at admeritia, who helps organizations prepare for and respond to incidents in OT environments. Tobias shares why disaster recovery planning in OT requires more than simply adapting IT frameworks. It demands a change in approach, mindset, and communication.


OT engineers don’t think in terms of “ransomware readiness.” They think in terms of safety, uptime, manual fallback options, and how long a plant can stay operational without a SCADA system. As Tobias explains, while IT teams worry about backup integrity and rapid rebooting, OT teams are focused on whether shutting down a system—even safely—is even an option. And when the recovery plan depends on third-party vendors, the assumptions made on both sides can derail the response before it begins.


Tobias walks us through the nuances of defining success in OT recovery. Unlike the IT world’s metrics like mean time to recover (MTTR), OT environments often hinge on production impacts and safety thresholds. Recovery Time Objectives (RTOs) still exist—but they must be anchored in real-world plant operations, often shaped by vendor limitations, legacy constraints, and tightly regulated safety requirements.


Perhaps most importantly, Tobias stresses that business continuity planning for OT can’t just be a cybersecurity add-on. It must be part of broader risk and operational conversations, ideally happening when systems are being designed or upgraded. But in reality, many organizations are only starting these conversations now—often driven more by compliance mandates than proactive risk strategy.


Whether you’re a CISO trying to bridge the gap with your OT counterparts or an engineer wondering why cyber teams keep showing up with playbooks that don’t fit, this conversation offers grounded, real-world insight into what preparedness really means for critical operations.


⬥SPONSORS⬥


LevelBlue: https://itspm.ag/attcybersecurity-3jdk3


ThreatLocker: https://itspm.ag/threatlocker-r974


⬥RESOURCES⬥


Inspiring Article: https://www.linkedin.com/posts/sarah-fluchs_notfallvorsorge-in-der-ot-traut-euch-activity-7308744270453092352-Q8X1


⬥ADDITIONAL INFORMATION⬥


✨ More Redefining CyberSecurity Podcast: 


🎧 https://www.seanmartin.com/redefining-cybersecurity-podcast.


Redefining CyberSecurity Podcast on YouTube:


📺    • Redefining CyberSecurity Podcast | Togethe...  


📝 The Future of Cybersecurity Newsletter:https://www.linkedin.com/newsletters/7108625890296614912/ 


Interested in sponsoring this show with a podcast ad placement? Learn more:


👉 https://itspm.ag/podadplcc




Other Videos By ITSPmagazine


2025-07-21Resonance and Reinvention: Crafting Sound from Salvaged History | A Conversation with  Cindy Hule...
2025-07-21Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pr...
2025-07-20The Proof Is in the Posture: What Real Security Maturity Looks Like | Bimal Sheth, Vincent Bennekers
2025-07-20The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with ...
2025-07-20The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with ...
2025-07-18The Hybrid Species — When Technology Becomes Human, and Humans Become Technology | A Musing On So...
2025-07-18The Hybrid Species — When Technology Becomes Human, and Humans Become Technology | A Musing On So...
2025-07-17ITSPmagazine Weekly Update | From AI Agents to Tape Mixes, to Guitars and Black Hat Buzzwords & more
2025-07-17ITSPmagazine Weekly Update | From AI Agents to Tape Mixes, to Guitars and Black Hat Buzzwords and...
2025-07-17ITSPmagazine Weekly Update | From AI Agents to Tape Mixes, to Guitars and Black Hat Buzzwords and...
2025-07-16OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with T...
2025-07-15Catching Up With Ken Munro — Hacking the Planet, One Car, One Plane, and One System at a Time
2025-07-15Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plan...
2025-07-15Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plan...
2025-07-08Beyond “Just Change Your Perspective” | Sage Brody
2025-07-08When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the...
2025-07-08When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the...
2025-07-07Episode 105 - Megastructures (Part II)
2025-07-01From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future...
2025-07-01From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future...
2025-06-30Cybersecurity Leadership: The Ongoing Struggle for a Seat at the Table | A Conversation with Jane...