YoVDO

The ABCs of Threat Activity Groups - Understanding and Analyzing Cyber Threats

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Threat Intelligence Courses Cybersecurity Courses Criminology Courses Industrial Control Systems Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of threat activity groups in this 54-minute webinar featuring Sergio Caltagirone, VP of Threat Intelligence at Dragos, and Dave Bittner, Producer and Host of The Cyberwire Podcast. Delve into the importance, identification, and analysis of these groups while examining key concepts such as the Diamond Model, Kill Chain, and Activity Group Life Cycle. Gain insights on activity group creation, families, and naming schemes. Discuss attribution challenges, the role of federal organizations, and the significance of intelligence versus data. Address topics like false flags, kinetic impacts, and criminology to enhance your understanding of cybersecurity threats in industrial control systems.

Syllabus

Introduction
The Diamond Model
The Kill Chain
Activity Groups
Life Cycle
Activity Group Creation
Why Activity Groups Matter
Activity Group Families
Attribution
Soft pushback
Naming schemes
Will there be a federal organization
Is attribution important
Data vs Intelligence
False Flags
Kinetic
Criminology


Taught by

Dragos: ICS Cybersecurity

Related Courses

Cyber-Physical Systems Security
Georgia Institute of Technology via Udacity
Specialized Attacks: OT and ICS
Pluralsight
CompTIA Network+ (N10-008) Cert Prep: 8 Network Integration and Operation
LinkedIn Learning
Fundamentals of OT Cybersecurity (ICS/SCADA)
Udemy
Why Groov EPIC
Opto Video via YouTube