Anatomy of an Attack
Register now and download a FREE copy of our Manufacturing Anatomy of Attack report
Industrial control systems (ICS) are the prime target for cyber attackers seeking to compromise the manufacturing base and public utilities. The legacy of old embedded Microsoft® operating systems provides attackers a beach head from which to launch their attack and establish “backdoors” to compromise the “enterprise.
Highlights of the report include:
- Manufacturing facilities and ICS devices where historically protected by air gap bubbles (networks blocked to any external / internet access )
- The IoT revolution and sleeper malware have “popped” the air gap bubble and SCADA devices are successfully attacked to an alarming extent
- TrapX has researched attacks against pharmaceutical , water treatment and power plants showing how attackers were able to bypass advanced controls using variety of methods
Download this important report to learn more
This report includes five anonymized case studies in which we share our findings, analysis and present actionable recommendations.