YoVDO

Manufacturing Cyber Threat Perspective - Dragos Webinar

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cybersecurity Courses Manufacturing Courses Threat Intelligence Courses Ransomware Courses Supply Chain Security Courses Industrial Control Systems Courses Network Segmentation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the increasing cyber risks in the manufacturing sector through this informative webinar presented by Selena Larson, Senior Threat Analyst at Dragos Threat Intelligence. Gain insights into five publicly tracked activity groups targeting manufacturing, the effects across the entire supply chain, and how interconnected processes in manufacturing facilities can impact operations. Learn about the growing threat of ransomware targeting industrial processes. Discover the vulnerabilities associated with internet-exposed assets, ICS systems, and the potential for disruptive attacks. Understand the value of operational data and intellectual property theft in the manufacturing context. Examine the impact of COVID-19 on malicious activities targeting research and vaccine development. Explore the risks associated with third-party and supply chain connections, network segmentation issues, Wi-Fi vulnerabilities in smart factories, and the challenges posed by lack of visibility in industrial environments. Conclude with defensive recommendations and strategies for building resilience in manufacturing cybersecurity.

Syllabus

Intro
WHO AMI SELENA LARSON
AGENDA THREATS TO MANUFACTURING
ACTIVITY GROUPS TARGETING MANUFACTURING
ICS MALWARE POTENTIAL FOR DISRUPTION
RANSOMWARE A SERIOUS THREAT
INTERNET-EXPOSED ASSETS USED FOR INITIAL ACCESS
ICS VULNERABILITIES LIKELY LIMITED ADVERSARY USE
IP THEFT OPERATIONAL DATA IS VALUABLE
CORONAVIRUS IMPACTS Malicious Activity Targeting COMID-19 Research, Vaccine
THIRD-PARTY/SUPPLY CHAIN LEVERAGING TRUSTED CONNECTIONS
NETWORK SEGMENTATION FLAT NETWORKS COMMON
WI-FI CONNECTIONS SMART- FACTORIES AND OTHER RISKS
LACK OF VISIBILITY BUILDING A HOUSE WITHOUT A FOUNDATION
DEFENSIVE RECOMMENDATIONS
BUILDING RESILIENCE


Taught by

Dragos: ICS Cybersecurity

Related Courses

IoT Device Security: Executive Briefing
Pluralsight
Defense Evasion with ProxyChains
Pluralsight
Lateral Movement with Infection Monkey
Pluralsight
Get Started with Network Security
Salesforce via Trailhead
AWS Security Best Practices: Network Infrastructure
Amazon Web Services via AWS Skill Builder