Download the Whitepaper: “What’s Your Next Move? Optimizing OT Security through Automatic Attacker Evaluation”
The download link for the whitepaper will be emailed to the email address entered, upon submitting the form.
Estimating potential cyber intruder activities and what attack path they may take to access our critical assets is important in understanding how we prioritize our security measures.
This paper focuses on an optimized method for automatically assessing those attack routes taking into account the challenges found due to the unique properties of industrial control systems.
This model takes into consideration threats, vulnerabilities, mitigation activities and potential impact to industrial components. With this model, we can determine potential routes that an intruder could take and prioritize each path based on the potential risk to the industrial application.