Two senior cybersecurity figures join Cyber 2.0

by Chief Editor

Cyber 2.0 Bolsters Its Advisory Board with Two Cybersecurity Titans

On Thursday, Cyber 2.0 announced the addition of Bob Flores, the former chief technology officer of the CIA, and Esti Peshin, a veteran of Israel Aerospace Industries’ cyber division, to its advisory board. The move is meant to sharpen the company’s focus on protecting operational technology (OT) and Internet‑of‑Things (IoT) environments.[jpost.com]

Why OT and IoT Security Matters More Than Ever

Cyber 2.0’s platform is designed to stop the lateral spread of attacks that slip past traditional security layers, working across both open and closed IT and OT networks.[jpost.com] In industrial settings and air‑gapped environments, this “last‑line” defense can block malicious activity before it reaches critical controllers such as PLCs, cameras, and edge devices.[jpost.com]

Bob Flores – From CIA CTO to OT Pioneer

Flores, who spent more than three decades at the CIA—including a stint as the agency’s first enterprise CTO—has never seen a solution as effective for OT and IoT protection as Cyber 2.0’s offering.[jpost.com] He now serves as senior partner at OODA LLC, venture partner at Guardian Ventures, and advisor to a host of technology firms.[jpost.com]

Esti Peshin – The AI‑Enabled Cyber Defender

Peshin brings a blend of AI expertise and hands‑on experience from Israel Aerospace Industries, Waterfall Security Solutions, Verint Systems, and an 11‑year tenure in an elite IDF technology unit.[jpost.com] She describes Cyber 2.0’s system as filling a long‑standing gap in OT and IoT security.

Geopolitical Pressure Accelerates OT Security Adoption

Recent warnings from Israeli and Western officials underscore the urgency. In December 2025, Israel’s National Cyber Directorate chief Yossi Karadi disclosed that Iran had compromised surveillance cameras to monitor Israeli VIPs, highlighting a broader trend of targeting civilian infrastructure.[jpost.com] Across the Atlantic, U.S. Military cyber adviser Brandon Pugh warned that the stakes for protecting civilian infrastructure are “enormous.”[jpost.com]

Industry Moves: Connected‑Vehicle Security Gets a Boost

In January 2026, automotive giant Škoda announced a partnership with Israeli start‑up Upstream to harden the cybersecurity of connected‑vehicle ecosystems, a clear sign that the auto sector is following the same OT‑IoT playbook.[jpost.com]

Did you know? Iran’s hack of surveillance cameras shows how even “low‑tech” IoT devices can become strategic espionage tools when not properly secured.
Pro tip: Integrate security controls at the design stage of any OT or IoT project—retro‑fitting security later is far more costly and less effective.

Frequently Asked Questions

  • What is the main purpose of Cyber 2.0’s advisory board? To bring deep expertise from intelligence and defense sectors that can guide the development of robust OT and IoT security solutions.[jpost.com]
  • How does Cyber 2.0 differ from traditional IT security tools? It focuses on “last‑line” defense for industrial controllers, cameras, and edge devices, operating in both open and closed network segments.[jpost.com]
  • Why is OT security becoming a national security issue? State‑backed actors are increasingly exploiting unsecured OT and IoT devices for espionage and sabotage, as illustrated by Iran’s camera intrusion and broader warnings from security chiefs.[jpost.com]

What’s Next for OT & IoT Security?

With the addition of Flores and Peshin, Cyber 2.0 is poised to accelerate research, develop common security standards, and expand its reach into critical infrastructure sectors worldwide. Companies that adopt a “security‑by‑design” mindset now will be better positioned to fend off the next wave of AI‑driven malware, supply‑chain attacks, and nation‑state threats.

Stay ahead of the curve—subscribe to our newsletter for the latest insights on OT, IoT, and AI security.

Share your thoughts or sign up for updates today!

You may also like

Leave a Comment