ctipilot.chSwitzerland · Europe · Public sector

Dragos 2025 OT Cybersecurity Year in Review — Frontlines IR Edition

annual-report · annual-report:dragos-2025-ot-frontlines

Coverage timeline
1
first 2026-05-08 → last 2026-05-08
Briefs
1
1 distinct
Sources cited
2
1 hosts
Sections touched
1
research
Co-occurring entities
0
no co-occurrence

Story timeline

  1. 2026-05-08CTI Daily Brief — 2026-05-08
    researchFirst and only treatment. 81% flat IT/OT architecture in IR engagements; 62% initial access via internet-exposed remote access; 34% intrusions reached operational process level; NIS2 compliance gaps identified. [SINGLE-SOURCE-OTHER]

Where this entity is cited

  • research1

Source distribution

  • dragos.com2 (100%)

Items in briefs about Dragos 2025 OT Cybersecurity Year in Review — Frontlines IR Edition (1)

Dragos 2025 OT Cybersecurity Year in Review: 81% of IR engagements found flat IT/OT network architecture

From CTI Daily Brief — 2026-05-08 · published 2026-05-10 · view item permalink →

Dragos released its 2025 OT Cybersecurity Year in Review — Frontlines IR Edition synthesising findings from industrial incident response engagements. Key statistics: 81% of engagements identified no meaningful IT/OT network segmentation, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).