Vulnerability Assessment – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Thu, 07 May 2026 12:20:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Vulnerability Assessment – Waterfall Security Solutions https://waterfall-security.com 32 32 Webinar: Everything You Know About OT Security Is Wrong https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-everything-you-know-about-ot-security-is-wrong/ Tue, 05 May 2026 11:42:52 +0000 https://waterfall-security.com/?p=39442 Discover why common OT security assumptions are wrong

The post Webinar: Everything You Know About OT Security Is Wrong appeared first on Waterfall Security Solutions.

]]>

Webinar: Everything You Know About OT Security Is Wrong

Misconceptions about OT security run deep and some of them sound reasonable until you test them against how industrial environments actually work.

Why Common OT Security Assumptions Are Wrong

Wed. May 27 @ 11am New York 

Does this sound familiar?

“Air gaps give a false sense of security.”

“Information is the asset – protect the CIA, or AIC, or IAC of the information.”

“If only we could patch, encrypt, AV, and IAM our OT systems just like we do our IT systems, then OT would be secure.”

“The real OT problem is all that brown-field equipment.”

“We have no budget for OT security.”

“IT and OT teams just don’t get along.”

“The first things we need are visibility and an asset inventory.

And so on…

Common wisdom in OT security is uncommonly mistaken. What’s really going on? Shoe factories are very different from passenger rail switching. Dramatically different worst-case consequences drive important differences between IT and OT security.

IT protection is preoccupied with espionage, while sabotage is the bigger threat in OT. Intrusion detection takes time, depends on human judgment, and by the time a human responds, the physical damage in an OT environment may already done.

Encryption and patching add complexity, uncertainty and cost enormously more in OT than they do in IT.

In this webinar we look at widespread misconceptions about OT security, at their root causes, and at more sensible approaches for teams making architecture and investment decisions today.

Webinar Key Takeaways:

• Why common OT security assumptions break down in practice
• How to present OT security to drive better results across your teams
• How consequence changes the way OT threats should be assessed
• Where IT security approaches fall short in industrial environments
• More defensible approaches to OT security decisions and designs

Who Should Attend?

• OT/ICS engineers
• IT security teams taking on OT security
• CISOs with critical infrastructure assets in their portfolio
• Plant managers evaluating security and investment

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 35,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Register Now

Share

The post Webinar: Everything You Know About OT Security Is Wrong appeared first on Waterfall Security Solutions.

]]>
Webinar: 13 Ways To Break “Secure” OT Remote Access Systems https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-13-ways-to-break-secure-ot-remote-access-systems/ Sun, 29 Mar 2026 10:58:06 +0000 https://waterfall-security.com/?p=39061 Explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable and which are most deserving of the “secure” title

The post Webinar: 13 Ways To Break “Secure” OT Remote Access Systems appeared first on Waterfall Security Solutions.

]]>

Webinar: 13 Ways To Break “Secure” OT Remote Access Systems

and the questions you should be asking your OT SRA vendor...

 

AVAILABLE NOW – STREAM THE RECORDING

How much security do “secure” remote access solutions really provide? We’re laying all the cards on the table.

In this webinar, we’ll explore 13 ways attackers can break OT remote access systems, show which SRAs are most vulnerable & which are most deserving of the “secure” title.

We’ll finish with the questions you should be asking vendors to understand how exposed their solutions are.

13 Ways to break secure OT reote access systems

Understanding attacks is essential to designing robust defenses. One way to compare the strength of competing OT SRA solutions is to compare the attacks those solutions defeat reliably, vs the attacks they do not defeat. 

In this webinar, we cover a lucky 13 ways to break “secure” remote access systems, and look at which kinds of systems are vulnerable to each kind of attack.

We finish with questions to ask “secure” OT remote access vendors to understand how exposed their solutions are to these kinds of attacks. 

In this session we cover VPNs, jump hosts and DMZ’s, and we look at the more modern cloud / broker / rendezvous architectures, as well as more deterministic, hardware-enforced solutions. 

The 13 Attacks We’ll Be Covering: 

1) Shoulder surfing attacks – how attackers capture credentials without hacking

2) Social engineering users – exploiting human behavior to gain access

3) Password guessing & brute-force attacks – why weak credentials still succeed

4) Help desk social engineering – bypassing security through support teams

5) Rogue OT remote access (SRA) – unauthorized remote connections into OT networks

6) Exploiting outdated encryption – breaking legacy crypto protocols still supported

7) Malware passing through VPNs – how threats propagate inside trusted remote connections

8) Malware hiding in file transfer & clipboards – hidden risks in everyday remote workflows

9) Session hijacking & stealing logged-in cell phones – taking over active authenticated sessions

10) Exploiting known vulnerabilities – patching gaps and N-days lead to breaches

11) Stealing cookies to hijack browser sessions – compromising web-based remote access and password vaults

12) Zero-day exploitation in OT remote access – how unknown vulnerabilities are weaponized

13) Bypassing remote access entirely – when attackers go straight through the firewall

Access our deep dive into modern attack vectors and discover the critical questions you should be asking your OT 'Secure' Remote Access vendors.

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 35,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Register Now

Share

The post Webinar: 13 Ways To Break “Secure” OT Remote Access Systems appeared first on Waterfall Security Solutions.

]]>