<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">

    2023 OT Cybersecurity Year in Review: Threat Landscape

    Original Air Date: 3/21/24

    Meet the Speakers

    Conor McLaren - Headshot
    Conor McLaren
    Principal Adversary Hunter

    Bryce Livingston - Headshot
    Bryce Livingston
    Senior Adversary Hunter

    Pivotal shifts in the cyber threat landscape have contributed to growing pressure on operational technology (OT) asset owners and defenders to know their adversaries. Attacks on IT put data at risk, but attacks on OT put safety and lives at risk.

    Adversary hunters Bryce Livingston and Conor McLaren share a comprehensive view of the global OT threat landscape including intelligence on:
    • New threat groups: VOLTZITE, GANANITE, LAURIONITE
    • Activity from other active threat groups targeting OT
    • Geopolitically driven cyber operations against critical infrastructure
    • High-profile campaigns and attacks from the past year
    • The impact of ransomware on industrial organizations
    Learn happened in 2023, why it matters, and what you need to do to stay ahead of OT adversaries in the coming year.
    2023 OT Cybersecurity Year in Review

    The 7th annual OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches – it’s your blueprint to OT cyber resilience. 


    2023 OT Cybersecurity Year in Review

    Not ready for all the in-depth data that the Year in Review report provides? The Dragos OT Cybersecurity Executive Summary gives you just the highlights from this year’s report to help you stay ahead of cyber attacks and protect your business operations in 2024.


    VOLTZITE Espionage Operations Targeting U.S. Critical Systems

    Our latest intel brief unveils VOLTZITE’s (overlaps with Volt Typhoon) sophisticated espionage operations targeting U.S. critical infrastructure. Learn how this affects your sector and the measures to mitigate risks.