Talk With an Expert

Billions at Stake: Insurance Data Reveals Correlation Between the SANS Five Critical Controls and Risk Reduction

  • Mon, Aug 25, 2025
  • 11:00AM - 12:00PM EDT
  • English
  • Tim Conway & Robert M. Lee
  • Technical Presentation
Webcast Hero

Did you know that much of your OT security risk comes from indirect effects to networks and operations? 

The groundbreaking 2025 OT Security Financial Risk Report has identified that “abundance-of-caution shutdowns” and impacts on supporting systems contribute significantly to financial losses in OT environments. This authoritative study, conducted by the largest insurance broker in the world, draws from 10 years of security events and insurance claims data—representing one of the most extensive analyses of OT security financial impact ever compiled. 

The financial impact of OT security breaches is escalating rapidly, with global costs projected in the tens of billions annually. North America and Europe face the highest event rates, with manufacturing organizations at particular risk. Statistical analysis of actual security incidents and insurance claims shows that the SANS Five ICS Cybersecurity Critical Controls can significantly reduce your OT security risk exposure.  

Developed through years of field experience by Dragos CEO and Co-Founder Robert M. Lee and SANS ICS Curriculum Lead Tim Conway, the SANS Five ICS Cybersecurity Critical Controls represent the industry’s most effective framework for protecting industrial environments from cyber threats. Join Rob, Tim, and Dragos Director of Strategy Mark Stacey on August 25 – they’ll brief you on the results of the study and pinpoint actionable strategies to reduce risk.

You’ll learn why Incident Response Planning shows the highest correlation to risk reduction and how implementing all five controls - including Defensible Architecture, ICS Network Visibility, Secure Remote Access, and Risk-Based Vulnerability Management - creates a robust defense against emerging threats. 

 The threat landscape won’t wait – and neither should you. Register now for this essential webinar and protect your organization’s operational technology from costly breaches.

Meet the Speakers