Skip to main content

Exploitable Vulnerabilities Hidden Deep in OT

There is a vulnerability that organizations must consider in their OT cybersecurity strategy, which can be termed “delicate by design.” Many OT systems contain idiosyncrasies in their configuration schema that increasingly sophisticated attackers can exploit to shut down a control system and even cause physical damage. The risk posed by these attributes has increased as state-sponsored threat actors increase their OT system knowledge.

In this session, Nick Cappi discusses delicate-by-design characteristics found in OT systems today; examples of how an attacker can exploit these issues to cause physical damage; and actions to mitigate the risk associated with these design issues.