YoVDO

ICS Security Crucible: Forging Programmatic Armor and Weapons for Industrial Operations

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Security Courses Cybersecurity Courses Risk Management Courses Security Automation Courses Maturity Models Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to industrial control system (ICS) security in this 29-minute conference talk. Discover the "ICS Security Crucible" concept, which integrates people, processes, and technology to craft tailored defenses for industrial operations. Learn how to address unique risks, impacts, budgets, and known threats through real-world use cases. Gain practical insights for developing or enhancing an ICS-specific security program, including the importance of using appropriate tools, understanding maturity models, and implementing effective governance, risk, and compliance (GRC) strategies. Delve into the challenges of ICS security and uncover solutions for building a robust defense framework tailored to your organization's specific needs.

Syllabus

Intro
Why is ICS security so difficult
Using the wrong tools
What is a crucible
mace
shield
bow
swords
build that out
roadmap
Maturity Model
The Crucible
GRC
Standards
Automation
The Right Tools
Define the Crucible


Taught by

Dragos: ICS Cybersecurity

Related Courses

Introduction to Finance
University of Michigan via Coursera
Information Security and Risk Management in Context
University of Washington via Coursera
Financial Engineering and Risk Management
Columbia University via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera