YoVDO

How to Operationalize ICS Threat Intelligence for Defenders

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Courses Cybersecurity Courses Threat Intelligence Courses Incident Response Courses Critical Infrastructure Courses NIST Cybersecurity Framework Courses Threat Detection Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to effectively operationalize Industrial Control Systems (ICS) threat intelligence in this 49-minute webinar. Learn why industrial organizations should prioritize ICS threat intelligence, discover the most valuable use cases to develop, and understand how it can drive stakeholder support. Gain insights into the shifting ICS cyber threat landscape, which now targets private industry, and explore various approaches to operationalize intelligence across different roles. Delve into key topics such as CTI data sources, components of good threat intelligence, and its application to the NIST Cybersecurity Framework. Examine specific use cases including threat detection, hunting, incident response, vulnerability management, and justification of OT cybersecurity investments. Understand how to assess defenses, conduct red teaming, and respond to RFIs using ICS threat intelligence.

Syllabus

Intro
CTI Key Takeaways
CTI Data Sources
Components of Good Threat Intelligence
CTI, applied NIST Cybersecurity Framework
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
What does this shift mean for ICS defenders?
Planning & Direction - PIRS
Processing and Analysis - TIA Assessment
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
USE CASE - THREAT DETECTION
USE CASE - THREAT HUNTING
USE CASE - INCIDENT RESPONSE
USE CASE - VULN MANAGEMENT
USE CASE - SOCIALIZATION OF THREATS
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
USE CASE - RESPOND TO RFIS
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING


Taught by

Dragos: ICS Cybersecurity

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera