<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">
  • VIDEO EPISODES 

    2025 OT THREAT LANDSCAPE

    The cyber threat landscape for OT and ICS environments is evolving rapidly. Watch this three-part video series to learn about the key trends impacting OT/ICS environments, major threat groups, and attack tactics shaping the security challenges of 2025.

    Episodes 🎬

    Episode 1: The State of OT Cyber Threats: Strategic Overview
    Episode 2: Know Your Adversaries: Who’s Targeting OT and Why
    Episode 3: Inside the ICS Cyber Kill Chain: How Attacks Unfold

    Episode 1: The State of OT Cyber Threats: Strategic Overview

    ⏱️ Watch Time: 10 minutes

    Understand the key trends shaping the OT threat landscape, from the growing focus on cyber adversaries in industrial environments to the role of geopolitical conflicts in fueling cyber operations. We will examine the convergence of state-sponsored adversaries, hacktivist groups, and ransomware groups - each bringing unique risks to critical industries. This strategic overview tackles the significant security challenges facing OT environments today.

     

    Episode 2: Know Your Adversaries: Who’s Targeting OT and Why

    ⏱️ Watch Time: 18 minutes

    Knowing the adversaries behind OT cyber threats is essential for effective defense. We will dive deep into the threat groups targeting industrial organizations and executing attacks on OT, including the latest attack campaigns to highlight regional and sector-specific targeting trends. By mapping out the targets and intent of these adversaries, security teams will be better equipped to anticipate and proactively defend against credible threats to their operations.

    Episode 3: Inside the ICS Cyber Kill Chain: How Attacks Unfold

    ⏱️ Watch Time: 13 minutes

    Despite the diversity of threat groups targeting OT, their attack patterns follow the same fundamental steps. We will walk through the ICS cyber kill chain, breaking down how adversaries infiltrate industrial networks, move laterally, and maintain control over critical systems. Analyzing real-world incidents will highlight standard techniques used across different threat groups and illustrate a crucial takeaway: while adversaries may vary, the core defensive measures remain consistent.

    Kyle OMeara - Headshot - Teal Circle
    Kyle O'Meara
    Director of Adversary Hunting

    Heath Moodie  - Dragos  -  Headshot - Teal Circle
    Heath Moodie
    Senior Threat Intelligence Analyst

    Stay ahead of OT Threats in 2025 and beyond.

    Dragos_YIR2025_iPad_1x_Final_Straight_Final

    SKIP

    See the Dragos Platform in Action