How to Operationalize ICS Threat Intelligence for Defenders
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Syllabus
Intro
CTI Key Takeaways
CTI Data Sources
Components of Good Threat Intelligence
CTI, applied NIST Cybersecurity Framework
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
What does this shift mean for ICS defenders?
Planning & Direction - PIRS
Processing and Analysis - TIA Assessment
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
USE CASE - THREAT DETECTION
USE CASE - THREAT HUNTING
USE CASE - INCIDENT RESPONSE
USE CASE - VULN MANAGEMENT
USE CASE - SOCIALIZATION OF THREATS
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
USE CASE - RESPOND TO RFIS
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING
Taught by
Dragos: ICS Cybersecurity
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera