How to Operationalize ICS Threat Intelligence for Defenders
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Syllabus
Intro
CTI Key Takeaways
CTI Data Sources
Components of Good Threat Intelligence
CTI, applied NIST Cybersecurity Framework
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
What does this shift mean for ICS defenders?
Planning & Direction - PIRS
Processing and Analysis - TIA Assessment
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
USE CASE - THREAT DETECTION
USE CASE - THREAT HUNTING
USE CASE - INCIDENT RESPONSE
USE CASE - VULN MANAGEMENT
USE CASE - SOCIALIZATION OF THREATS
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
USE CASE - RESPOND TO RFIS
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING
Taught by
Dragos: ICS Cybersecurity
Related Courses
Cybersecurity Policy for Water and Electricity InfrastructuresUniversity of Colorado System via Coursera Cybersecurity Fundamentals: Architecting a Solution
Udemy Implementing the NIST Framework for Improving Critical Infrastructure Cybersecurity in Your Organization
Pluralsight Cybersecurity Foundations
LinkedIn Learning Security Governance & Compliance
University of California, Irvine via Coursera