YoVDO

Analyzing and Defending Against TRISIS - Safety Instrumentation Systems Cybersecurity

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Courses Cybersecurity Courses Malware Analysis Courses Threat Mitigation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an in-depth analysis of the TRISIS malware and learn effective strategies to protect Safety Instrumentation Systems (SIS) in this 54-minute conference talk by Dragos: ICS Cybersecurity. Dive into the background, timeline, and technical details of the TRISIS attack, including its impact on safety systems and potential consequences. Gain insights into the malware's logic organization, payload structure, and program compilation process. Discover mitigation techniques, defense strategies, and the ICS Cyber Kill Chain specific to TRISIS. Understand the four types of detection and learn smart questions to ask when assessing your organization's cybersecurity posture. Enhance your knowledge of industrial control system security and develop a comprehensive approach to safeguarding critical infrastructure against sophisticated cyber threats.

Syllabus

Intro
Background: By the numbers
Dragos Timeline
What are Safety Instrumentation Systems?
Safety Systems
Explanation: How it happened
Logic Organization - TriStation 1131
Appending to a Program
First payload is a check payload
Egg Hunt and Overwrite Memory
Appending TRISIS
Program Epilogue
Second Logic Upload - Speculation
Program Compilation
TRISIS Effects
TRISIS - Potential Effects
Explanation: What comes next
Mitigation: How to protect
Mitigation: How to defend
ICS Cyber Kill Chain
Known TRISIS ICS Kill chain
The Four Types of Detection
Types of Detection - TRISIS
Smart Questions to ask


Taught by

Dragos: ICS Cybersecurity

Related Courses

Cybersecurity for Business
University of Colorado System via Coursera
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Security Analyst
Udacity
Cisco Core Security: Email Security with Cisco ESA
Pluralsight
Cisco Core Security: Security Concepts
Pluralsight