YoVDO

Manufacturing Cyber Threat Perspective - Dragos Webinar

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cybersecurity Courses Manufacturing Courses Threat Intelligence Courses Ransomware Courses Supply Chain Security Courses Industrial Control Systems Courses Network Segmentation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the increasing cyber risks in the manufacturing sector through this informative webinar presented by Selena Larson, Senior Threat Analyst at Dragos Threat Intelligence. Gain insights into five publicly tracked activity groups targeting manufacturing, the effects across the entire supply chain, and how interconnected processes in manufacturing facilities can impact operations. Learn about the growing threat of ransomware targeting industrial processes. Discover the vulnerabilities associated with internet-exposed assets, ICS systems, and the potential for disruptive attacks. Understand the value of operational data and intellectual property theft in the manufacturing context. Examine the impact of COVID-19 on malicious activities targeting research and vaccine development. Explore the risks associated with third-party and supply chain connections, network segmentation issues, Wi-Fi vulnerabilities in smart factories, and the challenges posed by lack of visibility in industrial environments. Conclude with defensive recommendations and strategies for building resilience in manufacturing cybersecurity.

Syllabus

Intro
WHO AMI SELENA LARSON
AGENDA THREATS TO MANUFACTURING
ACTIVITY GROUPS TARGETING MANUFACTURING
ICS MALWARE POTENTIAL FOR DISRUPTION
RANSOMWARE A SERIOUS THREAT
INTERNET-EXPOSED ASSETS USED FOR INITIAL ACCESS
ICS VULNERABILITIES LIKELY LIMITED ADVERSARY USE
IP THEFT OPERATIONAL DATA IS VALUABLE
CORONAVIRUS IMPACTS Malicious Activity Targeting COMID-19 Research, Vaccine
THIRD-PARTY/SUPPLY CHAIN LEVERAGING TRUSTED CONNECTIONS
NETWORK SEGMENTATION FLAT NETWORKS COMMON
WI-FI CONNECTIONS SMART- FACTORIES AND OTHER RISKS
LACK OF VISIBILITY BUILDING A HOUSE WITHOUT A FOUNDATION
DEFENSIVE RECOMMENDATIONS
BUILDING RESILIENCE


Taught by

Dragos: ICS Cybersecurity

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network