Download the Security Brief: “Fine-Tuning ICS Threat Models to Prioritize Mitigations on the Most Vulnerable Devices”
Upon submitting the form below, the download link for the whitepaper will be emailed to the email address entered.
As industrial control systems grow in complexity, the ability to evaluate their vulnerability to attack becomes increasingly important to automate. Security assessment tools usually begin by determining vulnerabilities of individual hosts. Using this and other information, such as connectivity between hosts, it’s possible to show the potential exploits attackers could use and the paths they can take to gain unauthorized access to a device on the ICS network. Automating this process ensures that every possible attack path is considered, and that the paths contain only those network entities that the intruder is capable of exploiting.