YoVDO

SolarWinds Compromise: Impact on ICS/OT Networks and Remediation Strategies

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Courses Cybersecurity Courses Digital Forensics Courses Malware Analysis Courses Incident Response Courses Supply Chain Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical implications of the SolarWinds compromise on ICS/OT networks in this 57-minute webinar by Dragos: ICS Cybersecurity. Gain insights into the sophisticated supply chain attack that affected 18,000 organizations worldwide, with a focus on industrial environments. Learn about the two types of operations involved, potential impacts, and receive expert recommendations for identifying and remediating affected systems. Discover strategies for gaining visibility, analyzing compromised environments, and conducting digital forensics. Understand the NERC implications and three-step standards for addressing the breach. Dive into specific examples, including the GE case, and explore the Supernova malware. Leave equipped with actionable knowledge on collecting forensic evidence and implementing effective cybersecurity measures to protect industrial control systems.

Syllabus

Intro
Agenda
Solar Winds
Solar Winds Compromise
What Happened
Two Types of Operations
What Does This Mean
Our Recommendations
What We Dont Know
Recommendations
Solar Winds Example
GE Example
Gain Visibility
DNS Query
Analyzing Compromised Environment
Digital Forensics Instant Response
Digital Forensics Virtual System
NERC Implications
Three Step Standards
Collection Management Framework
Questions
Collecting Forensic Evidence
Supernova
What to do


Taught by

Dragos: ICS Cybersecurity

Related Courses

Foundations of Computer Science for Teachers
The University of Texas at Austin via edX
Computer Forensics
Rochester Institute of Technology via edX
FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera
Cyber Security
CEC via Swayam
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX