VIDEO EPISODES
2025 OT THREAT LANDSCAPE
The cyber threat landscape for OT and ICS environments is evolving rapidly. Watch this three-part video series to learn about the key trends impacting OT/ICS environments, major threat groups, and attack tactics shaping the security challenges of 2025.
Episodes 🎬
Episode 1: The State of OT Cyber Threats: Strategic OverviewEpisode 2: Know Your Adversaries: Who’s Targeting OT and Why
Episode 3: Inside the ICS Cyber Kill Chain: How Attacks Unfold

Episode 1: The State of OT Cyber Threats: Strategic Overview
⏱️ Watch Time: 10 minutes
Understand the key trends shaping the OT threat landscape, from the growing focus on cyber adversaries in industrial environments to the role of geopolitical conflicts in fueling cyber operations. We will examine the convergence of state-sponsored adversaries, hacktivist groups, and ransomware groups - each bringing unique risks to critical industries. This strategic overview tackles the significant security challenges facing OT environments today.

Episode 2: Know Your Adversaries: Who’s Targeting OT and Why
⏱️ Watch Time: 18 minutes
Knowing the adversaries behind OT cyber threats is essential for effective defense. We will dive deep into the threat groups targeting industrial organizations and executing attacks on OT, including the latest attack campaigns to highlight regional and sector-specific targeting trends. By mapping out the targets and intent of these adversaries, security teams will be better equipped to anticipate and proactively defend against credible threats to their operations.

Episode 3: Inside the ICS Cyber Kill Chain: How Attacks Unfold
⏱️ Watch Time: 13 minutes
Despite the diversity of threat groups targeting OT, their attack patterns follow the same fundamental steps. We will walk through the ICS cyber kill chain, breaking down how adversaries infiltrate industrial networks, move laterally, and maintain control over critical systems. Analyzing real-world incidents will highlight standard techniques used across different threat groups and illustrate a crucial takeaway: while adversaries may vary, the core defensive measures remain consistent.

Kyle O'Meara
Director of Adversary Hunting


Heath Moodie
Senior Threat Intelligence Analyst
