The Bad Guy's Different Set of Rules

Security Breach

Security Breach
The Bad Guy's Different Set of Rules
Apr 03, 2026
Eric Sorensen

Send us Fan Mail

Not to continue to beat our collective heads into the same wall, but by now everyone knows that manufacturing leads the way in targeted cyberattacks, as well as year-over-year increases in areas like ransomware attacks, DDoS shutdowns and data breaches. 

Yet, the industry continues to demonstrate some troubling behaviors in the face of these realities. 

Kiteworks recently found that only 36% of organizations have visibility into where their data is utilized by external partners. So, think supply chains, distributor fulfillment agreements and technology contractors that have access to your data, but may not be applying the appropriate security strategies. 

This means you could be the victim of an attack, but remain in the dark about its origins, enabling the intrusion to happen again and again.

Fortunately, we do have some good guys working to correct these vulnerabilities, and we’ll talk with one in this episode. Watch/listen as Tim Freestone, the Chief Strategy Officer at the aforementioned Kiteworks, discusses:

  • How attackers are leveraging new technology more quickly than the white hats, and why AI might be the tool that evens the playing field.
  • Why response plans need to focus more on "the big rocks than the little ones."
  • The difference between input from "champions" versus "complainers."
  • How CMMC could have an impact beyond just the defense supply chain.
  • The continued use of IT and OT silos that might might make sense from a business perspective, but demand a paradigm shift when dealing with cybersecurity.
  • Why regulations might be the most important agents of change.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork The Bad Guy's Different Set of Rules 29:01 Episode Artwork Finding the Soul of a Pirate 37:35 Episode Artwork Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks 36:38 Episode Artwork Hybrid Warfare is Upon You 31:34 Episode Artwork Security Breach: Strengthening Your Weakest Links 32:58 Episode Artwork Clarifying the Big-Picture Impacts of CMMC 41:23 Episode Artwork Shiny Objects and the Power of Preparation 44:22 Episode Artwork You Don't Have to Out-Tech the Hacker 40:55 Episode Artwork Speaking the Right Language 46:39 Episode Artwork Why People Are Not the Biggest Risk 49:03 Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:05 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:22 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:23 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 38:41