<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">

Dragos currently tracks more than 3000 Common Vulnerabilities and Exposures (CVEs) that affect ICS/OT networks. Of these CVEs, more than 400 have at least one publicly available exploit and some with multiple. Public exploits affect every level of an industrial environment, providing adversaries pre-packaged tools capable of infiltrating and spreading through an ICS/OT network.

Download this whitepaper to enable operators to remediate ICS/OT vulnerabilities more effectively. You will learn:

  • What well-known organizations publish nearly 25% of all public ICS/OT exploits
  • Why the amount of ICS/OT CVEs decreased in 2020
  • Why the ability to pivot and persist within an ICS/OT network is the most common impact of a public exploit
  • What public exploits are useless within the context of an ICS/OT network
  • Based on the known public ICS/OT exploits, what vulnerabilities should be remediated first

Download your free whitepaper