março 3, 2026
(16:00 - 16:45 UTC +01:00)
Show in different timezone
(Academy Online)
Webinar (Online)
Inglês
Wpuc99en
StationGuard

OT Vulnerabilities in Power Systems: What our Statistics Reveal

março 3, 2026
(16:00 - 16:45 UTC +01:00)
Show in different timezone
(Academy Online)
Webinar (Online)
Inglês
Wpuc99en
StationGuard

Resumo

This webinar presents key findings based on an extensive security advisory and vulnerability dataset covering dozens of OT and network equipment vendors. The analysis includes roughly 15,000 vulnerabilities collected from 6,000 vendor security advisories across multiple years. After explaining how this data was obtained, we show how vulnerability volume, severity, and vendor disclosure practices evolved in 2025 and how they compare to long-term trends. Beyond attack vectors, the session presents detailed statistics on CWEs, highlighting which classes of weaknesses dominate OT environments and what this implies for exploitability. The objective is to translate vulnerability statistics into practical guidance for IT and OT engineers and decision-makers responsible for energy systems.

Objetivos

  • Understand recent vulnerability trends in the context of long-term OT exposure patterns
  • Learn how vendor disclosure practices influence risk visibility and response planning
  • Understand how attack vectors and CWE classes shape exploitability in OT environments
  • Derive practical takeaways for risk prioritization in energy and power grid environments
     
  •  

Conteúdo

  • Scope and methodology behind OMICRON’s OT vulnerability dataset
  • Vendor disclosure behavior and advisory quality across OT suppliers
  • Attack vector distribution and implications for mitigation planning
  • CWE-based analysis of dominant OT weakness classes and exploitability
     
  •  

Duração

45 minutes

Público

IT Professionals
OT Security Professionals

Pré-requisitos

Basic Cybersecurity Knowledge

Soluções

StationGuard

You are using an outdated browser version.
Please upgrade your browser or use another browser to view this page correctly.
×