MITRE ATT&CK for ICS: Improving Threat Detection and Response in Industrial Control Systems
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Syllabus
Intro
What is MITRE?
Announcing ATT&CK for ICS
What is Dragos?
Agenda
What is ATT&CK?
Breaking Down ATT&CK
Motivation for ATT&CK for ICS
ATT&CK for ICS Technique Matrix
Process of Mapping to ATT&CK
Find the Behavior
Research the Behavior
Translate the Behavior into a Tactic
Figure Out What Technique Applies
Threat Intel Mapping
Assessing Coverage
Identify Adversary Methodology
ICS Access
Intrusion, Recon, & Control
Attack Delivery & Execution
ICS-Specific Impacts
Mapping ICS Threats to ATT&CK
Typical Defense Development
Alternative: Identify 'Weird'
Problem: No Context
Identifying Threat Behaviors
ATT&CK and Threat Behaviors
Complete Threat Detection
Continuous Development
Community Engagement
Continued Adversary Evolution
Mapping ATT&CK to ICS Threats
References & Resources
Taught by
Dragos: ICS Cybersecurity
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn