
OT Vulnerabilities in Power Systems: What our Statistics Reveal
Résumé
This webinar presents key findings based on an extensive security advisory and vulnerability dataset covering dozens of OT and network equipment vendors. The analysis includes roughly 15,000 vulnerabilities collected from 6,000 vendor security advisories across multiple years. After explaining how this data was obtained, we show how vulnerability volume, severity, and vendor disclosure practices evolved in 2025 and how they compare to long-term trends. Beyond attack vectors, the session presents detailed statistics on CWEs, highlighting which classes of weaknesses dominate OT environments and what this implies for exploitability. The objective is to translate vulnerability statistics into practical guidance for IT and OT engineers and decision-makers responsible for energy systems.
Objectifs
- Understand recent vulnerability trends in the context of long-term OT exposure patterns
- Learn how vendor disclosure practices influence risk visibility and response planning
- Understand how attack vectors and CWE classes shape exploitability in OT environments
- Derive practical takeaways for risk prioritization in energy and power grid environments
Contenu
- Scope and methodology behind OMICRON’s OT vulnerability dataset
- Vendor disclosure behavior and advisory quality across OT suppliers
- Attack vector distribution and implications for mitigation planning
- CWE-based analysis of dominant OT weakness classes and exploitability
Durée
45 minutes
Public
IT Professionals
OT Security Professionals
Prérequis
Basic Cybersecurity Knowledge
Solutions
StationGuard

„C’est bon de savoir que les formateurs connaissent vraiment les sujets dont ils parlent.“