YoVDO

Uncovering Industrial Control System Threat Activity Groups

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Threat Intelligence Courses Cybersecurity Courses Industrial Control Systems Courses Critical Infrastructure Courses Espionage Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive 45-minute presentation by Dragos on eight threat activity groups targeting industrial companies. Learn about the spectrum of threats, from espionage to direct attacks on human life, and gain insights into Dragos' approach to identifying ICS threats. Discover the role of threat analytics in intelligence-driven strategies and understand why intelligence is crucial for ICS threat detection and response. Join speakers Sergio Caltagirone and Joe Slowik as they delve into naming conventions, fancy names, diamond events, types of analytics, group classification, and correlation techniques. Examine specific cases of electric utility targeting and gather essential final points on industrial cybersecurity.

Syllabus

Introduction
Naming Convention
Fancy Names
Diamond Events
Activity Groups
Types of Analytics
Creating Activity Groups
Classification and Clustering
Linking Groups
Names
Correlation
Electric Utility Targeting
Final Points


Taught by

Dragos: ICS Cybersecurity

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn