Completed
Do we understand the vulnerability?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Key Findings
- 3 Goofy Venn Diagram
- 4 Purdue Model Example
- 5 Dragos Process
- 6 Dragos Sources
- 7 Answer the Three Questions
- 8 Do we understand the vulnerability?
- 9 Prioritization
- 10 Dragos Threat Score
- 11 Rockwell Automation Connected Components Workbench
- 12 General Electric Communicator
- 13 Patching
- 14 Mitigation
- 15 Risk-Based Approach
- 16 Monitoring
- 17 Recommendations for Vendors and ICS-CERT