SIMON HODGKINSON
OPERATIONS
“ According to recent research into OT network domains , Denial-of-Service ( DoS ), malware activity leads in frequency as one of the most prevalent attacks against OT systems . This is followed by the Remote Access Trojan ( RAT ) category commonly used by attackers to establish control over compromised machines as it provides flexibility in the next stages of an attack .”
OT cyberattacks predominantly come in two forms : tailored attacks and opportunistic attacks . Tailored attacks are meticulously crafted for specific targets , aiming to establish long-term , undetected access for purposes of physical disruption or destruction . Opportunistic attacks , on the other hand , exploit common vulnerabilities and utilise established tactics , techniques , and procedures ( TTPs ) to gain access to OT systems .
“ The number of threats and actors targeting OT has increased ,” explains Evans . “ Nation-state actors , cybercriminals who understand the economic value represented by each sector , and hacktivists seeking to publicly advance their objectives or broad agendas .”
SIMON HODGKINSON
TITLE : STRATEGIC ADVISOR COMPANY : SEMPERIS INDUSTRY : NETWORK SECURITY LOCATION : UNITED KINGDOM
Evans is a recognised expert in OT cybersecurity and has a deep understanding of the unique challenges and requirements of securing industrial systems . He is passionate about helping organisations protect their critical infrastructure from cyberattacks and is committed to providing his clients with the best possible solutions .
OPERATIONAL TECHNOLOGY
Operational technology ( OT ) networks can contain hundreds or thousands of devices from a variety of vendors , many of which are insecure by design – lacking authentication , encryption , and other security standards . Identifying and prioritising critical vulnerabilities in OT & IoT devices is an important component of any risk management process .