VIDEO EPISODES
Prioritizing OT Vulnerabilities
The volume of disclosed vulnerabilities continues to grow, but not all threats carry equal weight – especially in industrial environments. Defenders need more than just alerts – they need clarity, context, and a plan. This two-part series cuts through the noise to help defenders focus on what OT vulnerabilities matters most.
Episodes 🎬
Episode 1: Vulnerabilities, Prioritization, and MitigationEpisode 2: Third-Party Vulnerabilities and Real-World Exploits

Episode 1: Vulnerabilities, Prioritization, and Mitigation
⏱️ Watch Time: 10 minutes
This episode, we dive into the vulnerability trends shaping 2024, including a breakdown of reported stats and what they reveal about adversary behavior. You’ll learn how to navigate CVSS scoring with real-world relevance, using the Now, Next, Never model to cut through the noise and focus on vulnerabilities that matter most. We’ll also explore the practical risk mitigation techniques tailored for operational environments and introduce the growing challenge of third-party vulnerabilities.

Episode 2: Third-Party Vulnerabilities and Real-World Exploits
⏱️ Watch Time: 18 minutes
This session focuses on the risks hiding in plain sight – third-party vulnerabilities embedded with your trusted software and hardware supply chains. We’ll walk through specific examples including DLL hijacking techniques, the Turducken protocol, and IoT exploits. Learn how these attack vectors operate and what it takes to defend against them using the SANS 5 Critical Controls as a baseline. This episode connects deep technical insights and prioritized action.

Kaysie Schippert
Vulnerability Analyst


Reid Wightman
Senior Principal Vulnerability Analyst
