How Do I Get Started?
Qualifying participants* upload their packet capture (.pcap) file and within a week, a report will be generated with insights into OT vulnerabilities that can become an embarkation point for security threats.
The report includes:
- LISTING OF ALL THE COMMUNICATING DEVICES.
- RISK SCORE FOR EVERY ASSET.
- POTENTIAL THREATS IN THE ENVIRONMENT.
- SUMMARY GRAPHICS FOR A CLEAR VIEW OF THE NETWORK CHARACTERISTICS AND ASSETS AT RISK.
* Organizations with a valid need to protect industrial assets will be accepted. Submission must be sent by an authorized employee of said organization and must have a valid company email address.