ICS OSINT - An Attacker’s Perspective
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore industrial control systems (ICS) open-source intelligence (OSINT) from an attacker's perspective in this 32-minute RSA Conference talk. Gain insights from Amy Bejtlich and Selena Larson of Dragos, Inc. as they delve into how adversaries leverage freely available data for reconnaissance in planning ICS attacks. Learn about ICS-specific OSINT techniques, key terms, and resources used by attackers. Discover the importance of OSINT in cybersecurity, its various applications, and the process of gathering intelligence. Examine real-world use cases involving vendor links, job postings, energy maps, and LinkedIn profiles. Understand the defender's perspective and the Ellison Collection Vulnerability Matrix to enhance your organization's security posture. Equip yourself with knowledge to decrease your attack surface and increase adversary friction in the realm of industrial control systems.
Syllabus
Introduction
Welcome
Agenda
Definitions
Why Does OSINT Matter
Applications Methods
Resources
Process
Key Terms
Why Target ICS
Open Source Intelligence
Use Cases
Vendor Link
Job Posting
Energy Map
LinkedIn
Defender Perspective
Ellison Collection Vulnerability Matrix
Taught by
RSA Conference
Related Courses
I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary SimulationYouTube Embrace the Red - Enhancing Detection Capabilities with Adversary Simulation
YouTube So You Think You Can Secure Your Cloud - Red Team Engagements in GCP
Security BSides San Francisco via YouTube Ferris Bueller's Guide to Abuse Domain Permutations
Security BSides San Francisco via YouTube Cracking the Perimeter with SharpShooter - Dominic Chell - Hack in Paris - 2019
Hack in Paris via YouTube