Report
Team82’s analysis of the riskiest operational technology (OT) exposures putting critical infrastructure organizations in the crosshairs of adversaries.
Advanced adversaries have ramped up cyberattacks targeting operational technology. APTs such as Volt Typhoon, Sandworm, and the CyberA3ngers are using purpose-built malicious tools to disrupt or modify processes managed by industrial control systems (ICS), and represent the greatest threats to public safety, and national and economic security.
In this report, Claroty’s research group, Team82, lays out the greatest risks associated with OT and ICS beyond merely assessing the criticality of a vulnerability. By exploring exposures such as whether devices contain known exploited vulnerabilities—including those linked to active ransomware campaigns—and whether those devices are insecurely connected to the internet, security leaders have a road map for prioritizing mitigations and remediations at a reduced cost.
Team82 analyzed close to one million OT devices within 270 organizations; the data in this report spans a number of industries under the umbrellas of manufacturing, logistics and transportation, and natural resources.
The riskiest OT exposures cannot be measured in critical CVEs alone. Doing so would place undue burden on asset owners and operators trying to boil an ocean of unpatched vulnerabilities; fixing them at any kind of scale would be done at a tremendous human and monetary resource drain.
We instead break down those exposures to smaller subsets of vulnerable devices, allowing leaders to consider remediation of the highest-risk devices first where the threat of exploitation is greatest, below.
Please complete the form to view the Report.