Search Results

1,044 Results
Type
Resource Type
Industries
Partners
Products & Services
Threat Group
Topics
There are 1,044 results that match your search.
  • Partner brief
    Dragos and ORDR combine OT visibility with intelligent policy enforcement to simplify network segmentation. Dragos identifies assets, vulnerabilities, and communication flows while ORDR enforces policies based on real OT requirements.
  • Timothy Vernick is a Senior ICS/OT Cyber Threat Intelligence Analyst at Dragos, specializing in threats to energy infrastructure and the design and implementation of defensive strategies for energy providers. He focuses on translating complex adversary behavior into actionable intelligence and resilient operational controls that reduce risk across industrial environments.
  • Mary Korus is a cybersecurity product marketing professional with more than a decade of experience helping organizations navigate complex security challenges across network, cloud, and industrial environments. She leads product marketing for the Dragos Platform, shaping how the company communicates its mission of safeguarding civilization through the protection of critical infrastructure.
  • Infographic
    This intelligence comes from the 2025 Dragos OT/ICS Cybersecurity Report and focuses on threat-driven defense strategies that address real adversary behaviors targeting manufacturing.
  • Datasheet
    The Dragos Platform is specifically designed for the unique challenges of industrial environments. Learn more about how Dragos can help you protect what matters most – download the Dragos Platform datasheet today.
  • Matt is Director, Business Development at Dragos where he is responsible for defining and establishing strategic partnerships that increase the value proposition of Dragos technologies and solutions to customers around the globe.
  • Liz Martin joined Dragos as a Solutions Architect from the National Security Agency (NSA), where she held previous roles as a Network Warfare Cyber Planner and Computer Network Defense Analyst. Liz is well-versed in leading major incident response efforts as well as network assessments across the U.S. Government and Intelligence Community supporting the defense of National Security Systems. She holds a master’s degree in cybersecurity technology and bachelor’s degree in cybersecurity management and policy. Liz was previously a competitive female bodybuilder and personal trainer.
  • Scott Bear is a Principal Threat Analyst at Dragos focused on threats to energy infrastructure. He brings a decade of U.S. Air Force experience in host and network forensics, incident response, threat hunting, and penetration testing, followed by roles at CrowdStrike and Dragos.
  • Infographic
    OT cyber threats are accelerating, putting $329B at risk and collapsing detection-to-impact timelines from months to hours. Get the infographic to see why modern attacks move faster than ever and what you need to you defend critical operations at speed.
  • Jimmy Wylie is a Technical Lead Malware Analyst at Dragos, Inc. who spends his days (and nights) searching for and analyzing threats to critical infrastructure. He was the lead analyst on PIPEDREAM, the first ICS attack “utility belt”, TRISIS, the first malware to target a safety instrumented system, and analysis of historical artifacts of the CRASHOVERRIDE attack, the first attack featuring malware specifically tailored to disrupt breakers and switchgear in an electric transmission substation.
  • Report
    This threat perspective from WorldView translates the current OT/ICS threat landscape for distributed energy resources (DER) and microgrids into clear steps that OT teams and leaders can take now.
  • Get proactive defense with OT Watch Complete. We operate the Dragos Platform for you—monitoring, validated escalations, tuning, and more.
  • On-demand answers or continuous guidance: OT cyber threat intelligence expertise tailored to your security needs.
  • Expert red team services for OT environments: vulnerability discovery, attack simulation, and detection training to validate industrial security controls.
  • Get specific, prioritized guidance to reduce risk and strengthen your industrial control system defenses with OT security assessments.
  • Immediately access OT cybersecurity experts with a Rapid Response Retainer. Pre-established agreements mean faster containment when crisis strikes.
  • Webinar
    OT environments have blind spots—unknown assets, unmanaged vulnerabilities, and misconfigurations. Adversaries exploit these in hours. Join our webinar that covers building real-time OT/IoT visibility, reducing lateral movement risks, and enabling faster threat response.