4/17 (Thu.) 16:15 - 16:45 4F 4A

The Analysis of Threatful ICS Vulnerabilities – The Case Study of the Insecure by Design

You may have seen a summary of various attack techniques on MITRE ATT&CK Enterprise. Do you know what are the top 10 ICS metrics that can be exploited?

You might have seen the CWE Top 25, but have you looked at the OT/ICS CWE Top?

We have compiled the top 10 most commonly used techniques (TIDs) in OT and the top 20 software weaknesses (CWE) that occur in OT.

More importantly, during the presentation, we will reveal multiple publicly disclosed ICS vulnerabilities as examples, explaining each vulnerability and exploitation method in a simple and easy-to-understand way, allowing the audience to clearly understand the threats to industrial control systems.

Daniel Chiu
SPEAKER
TXOne Networks Inc.
Threat Research Manager

TOPIC / TRACK
Security Strategy & Case Study

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4A

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
ICS/SCADA Security
Threat Intelligence
Threat Research