How to Operationalize ICS Threat Intelligence for Defenders
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Syllabus
Intro
CTI Key Takeaways
CTI Data Sources
Components of Good Threat Intelligence
CTI, applied NIST Cybersecurity Framework
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
What does this shift mean for ICS defenders?
Planning & Direction - PIRS
Processing and Analysis - TIA Assessment
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
USE CASE - THREAT DETECTION
USE CASE - THREAT HUNTING
USE CASE - INCIDENT RESPONSE
USE CASE - VULN MANAGEMENT
USE CASE - SOCIALIZATION OF THREATS
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
USE CASE - RESPOND TO RFIS
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING
Taught by
Dragos: ICS Cybersecurity
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn