Episode Details
Back to Episodes
Looking Back at 2025: Cybersecurity at a Turning Point
Description
2025 was the year detection stopped being enough.
Because attacks stopped behaving the way detection was built to handle.
OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late.
In this special end-of-year Threat Talks episode, Lieuwe Jan Koning is joined by Luca Cipriano, Yuri Wit, and Rob Maas, all in ugly Christmas sweaters, to unpack why the cybersecurity trends of 2025 represent a structural break, not a gradual evolution.
They trace how attackers scaled faster than defenders, why SOC automation became unavoidable, and how preemptive security and Zero Trust execution are emerging as the only way to regain control.
This isn’t a recap for curiosity.
It’s a map of how we got here - and what must change in 2026 to stay ahead.
- (00:00) - Introduction: why 2025 felt fundamentally different
- (01:31) - - 05:12 The threat landscape shifts: OT security and real-world impact
- (05:12) - - 07:27 A new normal: how AI changed daily security work
- (07:27) - - 09:31 The most surprising attacks of 2025
- (09:31) - - 20:00 Inside the SOC: scale, speed, and analyst fatigue
- (20:00) - - 22:15 “There are protections against AI… right?”
- (22:15) - - 20:23 Zero Trust redefined: can it handle AI-driven attacks?
- (30:23) - - 32:04 Why prevention matters more than ever
- (32:04) - - 41:06 Looking ahead: predictions for cybersecurity in 2026
Key Topics Covered
• How AI-powered attacks and autonomous malware altered attacker economics
• Why OT security and critical infrastructure moved to the front line
• Where SOC automation helps - and where it creates false confidence
• Why preemptive security and Zero Trust shift defense from reaction to control
Related ON2IT Content & Referenced Resources
I-Soon episode
https://www.youtube.com/watch?v=Rkp4OWOcCeU&t=1s
Salesloft supply chain attack episode
https://www.youtube.com/watch?v=_asJ2AN7cbA
PromptLock malware episode
https://www.youtube.com/watch?v=lKcUwLPBC8k
MCP security episode
https://www.youtube.com/watch?v=IkV6jkuYz5g
Zero Trust episodes playlist
https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g
Zero Trust infographic (PDF)
https://on2it.s3.us-east-1.amazonaws.com/250429_Infographic_ZT.pdf
Threat Talks is built for CISOs and security leaders navigating real trade-offs—not vendor promises.
Subscribe for grounded insight on Zero Trust execution, AI-driven threats, SOC automation, and preemptive security from practitioners in the field.
Click here to view the episode transcript.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX