About Session
Technical Level: Intermediate
Fifteen years after Stuxnet, OT/ICS threats have evolved far beyond state-sponsored malware. This session tracks the broader landscape of malicious activity, from ransomware on engineering workstations to botnets targeting industrial routers. Using new data from honeypots and malware repositories, we highlight the real-world threats asset owners face today—often overlooked in favor of high-profile attacks. Learn how attackers exploit perimeter devices, abuse OT protocols, wipe critical data, and infect legitimate OT software.