How to Operationalize ICS Threat Intelligence for Defenders
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Syllabus
Intro
CTI Key Takeaways
CTI Data Sources
Components of Good Threat Intelligence
CTI, applied NIST Cybersecurity Framework
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
What does this shift mean for ICS defenders?
Planning & Direction - PIRS
Processing and Analysis - TIA Assessment
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
USE CASE - THREAT DETECTION
USE CASE - THREAT HUNTING
USE CASE - INCIDENT RESPONSE
USE CASE - VULN MANAGEMENT
USE CASE - SOCIALIZATION OF THREATS
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
USE CASE - RESPOND TO RFIS
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING
Taught by
Dragos: ICS Cybersecurity
Related Courses
Cyber-Physical Systems SecurityGeorgia Institute of Technology via Udacity Specialized Attacks: OT and ICS
Pluralsight CompTIA Network+ (N10-008) Cert Prep: 8 Network Integration and Operation
LinkedIn Learning Fundamentals of OT Cybersecurity (ICS/SCADA)
Udemy Why Groov EPIC
Opto Video via YouTube