ICS Security Crucible: Forging Programmatic Armor and Weapons for Industrial Operations
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore an innovative approach to industrial control system (ICS) security in this 29-minute conference talk. Discover the "ICS Security Crucible" concept, which integrates people, processes, and technology to craft tailored defenses for industrial operations. Learn how to address unique risks, impacts, budgets, and known threats through real-world use cases. Gain practical insights for developing or enhancing an ICS-specific security program, including the importance of using appropriate tools, understanding maturity models, and implementing effective governance, risk, and compliance (GRC) strategies. Delve into the challenges of ICS security and uncover solutions for building a robust defense framework tailored to your organization's specific needs.
Syllabus
Intro
Why is ICS security so difficult
Using the wrong tools
What is a crucible
mace
shield
bow
swords
build that out
roadmap
Maturity Model
The Crucible
GRC
Standards
Automation
The Right Tools
Define the Crucible
Taught by
Dragos: ICS Cybersecurity
Related Courses
Основные методы обеспечения информационной безопасностиE-Learning Development Fund via Coursera Assessing the Security Posture of ICS Infrastructure Using ISA 62443 Standard
nullcon via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube Attacking Electric Motors for Fun and Profit
Black Hat via YouTube Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks
Black Hat via YouTube