Hi Experts,
I want to share with you the recently published Claroty's ICS RISK & VULNERABILITY report.
The report is highly important and provide deep info about vulnerabilities in the OT sector. One of the most interesting parts of the report is the top mitigation steps. it can be seen that the most required mitigation step is segmentation. this figure completely correlate with Check point offering for the ICS/OT sector. Segmentation can be easily achieved by using Firewall and Application Control Blade, using all Check Point's Gateways