{"id":86892,"date":"2024-04-15T12:35:25","date_gmt":"2024-04-15T19:35:25","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/webinars\/2023-threat-roundup-report-copy\/"},"modified":"2024-08-26T07:18:36","modified_gmt":"2024-08-26T14:18:36","slug":"the-emergence-of-exposed-ics-trends-threats-and-best-practices","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/","title":{"rendered":"The Emergence of Exposed ICS: Trends, Threats, and Best Practices"},"content":{"rendered":"<p>WEBINAR<\/p>\n<h1>The Emergence of Exposed ICS: Trends, Threats, and Best Practices<\/h1>\n\n<p>Despite years of efforts to raise awareness, implement regulations, and issue advisories, operational technology (OT) and industrial control systems (ICS) continue to face significant exposure risks. Since 2017, Forescout Research \u2013 Vedere Labs has diligently monitored these risks, uncovering attacks and tracking the evolving landscape.<\/p>\n<p>Join Elisa Costante, VP of Research alongside Rik Ferguson, VP of Security Intelligence as they delve into the changing dynamics of exposed ICS. They will discuss the emerging role of hacktivism, regional variations in exposure rates, the most targeted services, and the inadvertent practices exacerbating vulnerabilities.<\/p>\n<h4 style=\"color: #009dea\">Featured Speakers:<\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 100%;height: auto\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/elisa-constantine.png\" alt=\"\" width=\"300\" height=\"300\"><\/p>\n<p style=\"text-align: center\"><strong>Elisa Costante<\/strong><br \/>\nVP, Research<br \/>\nForescout\n\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 100%;height: auto\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/Rik-Furgeson.png\" alt=\"\" width=\"300\" height=\"300\"><\/p>\n<p style=\"text-align: center\"><strong>Rik Ferguson<\/strong><br \/>\nVP, Security Intelligence<br \/>\nForescout\n\n<h5 style=\"color: #009dea\">What you\u2019ll discover in this research Q&amp;A session:<\/h5>\n<ul>\n<li>The persistent challenges in securing OT and ICS environments<\/li>\n<li>Regional exposure disparities and evolving trends from 2017 to 2024<\/li>\n<li>Critical insights into the most vulnerable ICS services and their implications<\/li>\n<li>Common practices contributing to the exposure of ICS<\/li>\n<li>Best practices for precise asset management and proactive risk mitigation in ICS<\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"\/company\/legal\/notice-of-collection\/\" rel=\"noopener\">Notice of Collection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WEBINAR The Emergence of Exposed ICS: Trends, Threats, and Best Practices Despite years of efforts to raise awareness, implement regulations, and issue advisories, operational technology (OT) and industrial control systems (ICS) continue to face significant exposure risks. Since 2017, Forescout Research \u2013 Vedere Labs has diligently monitored these risks, uncovering attacks and tracking the evolving [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":86895,"parent":84198,"menu_order":204,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-86892","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Emergence of Exposed ICS - Forescout Webinar<\/title>\n<meta name=\"description\" content=\"Uncover risks to operational technology (OT) &amp; industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Emergence of Exposed ICS - Forescout Webinar\" \/>\n<meta property=\"og:description\" content=\"Uncover risks to operational technology (OT) &amp; industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-26T14:18:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\",\"url\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\",\"name\":\"The Emergence of Exposed ICS - Forescout Webinar\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png\",\"datePublished\":\"2024-04-15T19:35:25+00:00\",\"dateModified\":\"2024-08-26T14:18:36+00:00\",\"description\":\"Uncover risks to operational technology (OT) & industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/www.forescout.com\/webinars\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Emergence of Exposed ICS: Trends, Threats, and Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Emergence of Exposed ICS - Forescout Webinar","description":"Uncover risks to operational technology (OT) & industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"The Emergence of Exposed ICS - Forescout Webinar","og_description":"Uncover risks to operational technology (OT) & industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.","og_url":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-08-26T14:18:36+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/","url":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/","name":"The Emergence of Exposed ICS - Forescout Webinar","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png","datePublished":"2024-04-15T19:35:25+00:00","dateModified":"2024-08-26T14:18:36+00:00","description":"Uncover risks to operational technology (OT) & industrial control systems (ICS) with Forescout Research. Explore regional exposure, vulnerabilities, and best practices.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/www.forescout.com\/webinars\/"},{"@type":"ListItem","position":3,"name":"The Emergence of Exposed ICS: Trends, Threats, and Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/ICS-Better-Safe-Than-Sorry-Webinar-Feature-v1-1200x628-1.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/86892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=86892"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/86892\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/86895"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=86892"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=86892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}