<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">
  • VIDEO EPISODES 

    Prioritizing OT Vulnerabilities

    The volume of disclosed vulnerabilities continues to grow, but not all threats carry equal weight – especially in industrial environments. Defenders need more than just alerts – they need clarity, context, and a plan. This two-part series cuts through the noise to help defenders focus on what OT vulnerabilities matters most. 

    Episodes 🎬

    Episode 1: Vulnerabilities, Prioritization, and Mitigation
    Episode 2: Third-Party Vulnerabilities and Real-World Exploits

    Episode 1: Vulnerabilities, Prioritization, and Mitigation

    ⏱️ Watch Time: 10 minutes

    This episode, we dive into the vulnerability trends shaping 2024, including a breakdown of reported stats and what they reveal about adversary behavior. You’ll learn how to navigate CVSS scoring with real-world relevance, using the Now, Next, Never model to cut through the noise and focus on vulnerabilities that matter most. We’ll also explore the practical risk mitigation techniques tailored for operational environments and introduce the growing challenge of third-party vulnerabilities. 

    Episode 2: Third-Party Vulnerabilities and Real-World Exploits

    ⏱️ Watch Time: 18 minutes

    This session focuses on the risks hiding in plain sight – third-party vulnerabilities embedded with your trusted software and hardware supply chains. We’ll walk through specific examples including DLL hijacking techniques, the Turducken protocol, and IoT exploits. Learn how these attack vectors operate and what it takes to defend against them using the SANS 5 Critical Controls as a baseline. This episode connects deep technical insights and prioritized action. 

    Kaysie Schippert - 250 x 250px
    Kaysie Schippert
    Vulnerability Analyst

    Reid Wightman
    Reid Wightman
    Senior Principal Vulnerability Analyst

    Stay ahead of OT Threats in 2025 and beyond.

    Dragos_YIR2025_iPad_1x_Final_Straight_Final

    SKIP

    See the Dragos Platform in Action