YoVDO

ICS OSINT - An Attacker’s Perspective

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Industrial Control Systems Courses Adversary Simulation Courses Attack Surface Management Courses

Course Description

Overview

Explore industrial control systems (ICS) open-source intelligence (OSINT) from an attacker's perspective in this 32-minute RSA Conference talk. Gain insights from Amy Bejtlich and Selena Larson of Dragos, Inc. as they delve into how adversaries leverage freely available data for reconnaissance in planning ICS attacks. Learn about ICS-specific OSINT techniques, key terms, and resources used by attackers. Discover the importance of OSINT in cybersecurity, its various applications, and the process of gathering intelligence. Examine real-world use cases involving vendor links, job postings, energy maps, and LinkedIn profiles. Understand the defender's perspective and the Ellison Collection Vulnerability Matrix to enhance your organization's security posture. Equip yourself with knowledge to decrease your attack surface and increase adversary friction in the realm of industrial control systems.

Syllabus

Introduction
Welcome
Agenda
Definitions
Why Does OSINT Matter
Applications Methods
Resources
Process
Key Terms
Why Target ICS
Open Source Intelligence
Use Cases
Vendor Link
Job Posting
Energy Map
LinkedIn
Defender Perspective
Ellison Collection Vulnerability Matrix


Taught by

RSA Conference

Related Courses

I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary Simulation
YouTube
Embrace the Red - Enhancing Detection Capabilities with Adversary Simulation
YouTube
So You Think You Can Secure Your Cloud - Red Team Engagements in GCP
Security BSides San Francisco via YouTube
Ferris Bueller's Guide to Abuse Domain Permutations
Security BSides San Francisco via YouTube
Cracking the Perimeter with SharpShooter - Dominic Chell - Hack in Paris - 2019
Hack in Paris via YouTube