ICS OSINT - An Attacker’s Perspective
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore industrial control systems (ICS) open-source intelligence (OSINT) from an attacker's perspective in this 32-minute RSA Conference talk. Gain insights from Amy Bejtlich and Selena Larson of Dragos, Inc. as they delve into how adversaries leverage freely available data for reconnaissance in planning ICS attacks. Learn about ICS-specific OSINT techniques, key terms, and resources used by attackers. Discover the importance of OSINT in cybersecurity, its various applications, and the process of gathering intelligence. Examine real-world use cases involving vendor links, job postings, energy maps, and LinkedIn profiles. Understand the defender's perspective and the Ellison Collection Vulnerability Matrix to enhance your organization's security posture. Equip yourself with knowledge to decrease your attack surface and increase adversary friction in the realm of industrial control systems.
Syllabus
Introduction
Welcome
Agenda
Definitions
Why Does OSINT Matter
Applications Methods
Resources
Process
Key Terms
Why Target ICS
Open Source Intelligence
Use Cases
Vendor Link
Job Posting
Energy Map
LinkedIn
Defender Perspective
Ellison Collection Vulnerability Matrix
Taught by
RSA Conference
Related Courses
Software Security: Keeping Pace with Rapid DevelopmentChariotSolutions via YouTube Cloud Threat Modeling - From Architecture Design to Application Development
RSA Conference via YouTube Open Source Tooling for Threat Analysis and Attack Surface Management
RSA Conference via YouTube Payload Delivery for Initial Access in Red Team Engagement
Hack In The Box Security Conference via YouTube Manage Your Attack Surface on a Budget
BSidesLV via YouTube