Uncovering Industrial Control System Threat Activity Groups
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore a comprehensive 45-minute presentation by Dragos on eight threat activity groups targeting industrial companies. Learn about the spectrum of threats, from espionage to direct attacks on human life, and gain insights into Dragos' approach to identifying ICS threats. Discover the role of threat analytics in intelligence-driven strategies and understand why intelligence is crucial for ICS threat detection and response. Join speakers Sergio Caltagirone and Joe Slowik as they delve into naming conventions, fancy names, diamond events, types of analytics, group classification, and correlation techniques. Examine specific cases of electric utility targeting and gather essential final points on industrial cybersecurity.
Syllabus
Introduction
Naming Convention
Fancy Names
Diamond Events
Activity Groups
Types of Analytics
Creating Activity Groups
Classification and Clustering
Linking Groups
Names
Correlation
Electric Utility Targeting
Final Points
Taught by
Dragos: ICS Cybersecurity
Related Courses
World of Spies: Keeping SecretsPurdue University via FutureLearn The Agency: A History of the CIA
The Great Courses Plus Heroes and Villains - Benedict Arnold and Social Mobility in the American Revolution
Yale University via YouTube Spying for Queen and Country - Tudor Intelligence vs Modern Secret Services
Gresham College via YouTube Unsung Heroes of World War II: Europe
The Great Courses Plus