YoVDO

ICS OSINT - An Attacker’s Perspective

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Industrial Control Systems Courses Adversary Simulation Courses Attack Surface Management Courses

Course Description

Overview

Explore industrial control systems (ICS) open-source intelligence (OSINT) from an attacker's perspective in this 32-minute RSA Conference talk. Gain insights from Amy Bejtlich and Selena Larson of Dragos, Inc. as they delve into how adversaries leverage freely available data for reconnaissance in planning ICS attacks. Learn about ICS-specific OSINT techniques, key terms, and resources used by attackers. Discover the importance of OSINT in cybersecurity, its various applications, and the process of gathering intelligence. Examine real-world use cases involving vendor links, job postings, energy maps, and LinkedIn profiles. Understand the defender's perspective and the Ellison Collection Vulnerability Matrix to enhance your organization's security posture. Equip yourself with knowledge to decrease your attack surface and increase adversary friction in the realm of industrial control systems.

Syllabus

Introduction
Welcome
Agenda
Definitions
Why Does OSINT Matter
Applications Methods
Resources
Process
Key Terms
Why Target ICS
Open Source Intelligence
Use Cases
Vendor Link
Job Posting
Energy Map
LinkedIn
Defender Perspective
Ellison Collection Vulnerability Matrix


Taught by

RSA Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera