Claroty has researched the CIP protocol attack surface from basic CIP to the advanced CIP Security. As part of our research methodology, we assume the attacker role and look for vulnerabilities and other security weaknesses in order to attack industrial equipment and networks that use the CIP protocol. We want to understand what vulnerabilities an attacker would exploit that allow them deeper access into an industrial network, or how they would disrupt or modify processes.
In this webinar, we will discuss our research journey into CIP Security, and why it’s the best way forward to understand and address existing risks to industrial networks at the protocol level. You’ll learn:
- More about current threats and risks to industrial networks, and how CIP Security protects them
- What the ecosystem looks like and what an attacker requires to leverage it
- Migration advice about moving to CIP Secure from Rockwell Automation and Claroty experts
- How to leverage Claroty’s CTD and Rockwell’s CIP Security to improve your OT security