YoVDO

Six Steps to Effective ICS Threat Hunting

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Threat Hunting Courses Cybersecurity Courses Threat Intelligence Courses Trend Analysis Courses Industrial Control Systems Courses Industrial Cybersecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive 6-step ICS threat hunting model applied to real-world scenarios in this 1-hour 10-minute webinar. Gain insights from Dragos and SANS Institute experts as they delve into environment vs threat hunting, threat intelligence, and effective tools and techniques. Learn about different types of threat hunting, utilizing various intel feeds, and the importance of baselines and coverage. Discover how to initiate conversations around threat hunting, apply the threat hunting model, and understand the trend hunting approach. Engage with a lightning round of questions and explore the crucial aspects of people, process, and technology in industrial cybersecurity.

Syllabus

Introduction
Two Types of Threat Hunting
Environment vs Threat Hunting
Threat Intel
Questions
Favorite Threat Intel Feed
Using Open Source Reporting
Dragos Intel Feed
Commercial Intel Feed
Technical Reports
Activity Groups
Baselines
Coverage
Start the Conversation
Tools Techniques Approach
Purpose
Threat Hunting Model Applied
Trend Hunting Model Applied
Trend Hunting Approach
Lightning Round Question
People Process and Technology


Taught by

Dragos: ICS Cybersecurity

Related Courses

Assessing the Security Posture of ICS Infrastructure Using ISA 62443 Standard
nullcon via YouTube
Stealing PLC Intellectual Property - A Red Teaming Story
Hack In The Box Security Conference via YouTube
Think Like a Hacker, but Act Like an Engineer
Kaspersky via YouTube
The Building Blocks of Good Detection and Response Services for the ICS Environment
Kaspersky via YouTube
Cybersecurity on Rails - A Look at the Connected Train
Kaspersky via YouTube