Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Dragos: ICS Cybersecurity via YouTube Direct link

Do we understand the vulnerability?

8 of 17

8 of 17

Do we understand the vulnerability?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Key Findings
  3. 3 Goofy Venn Diagram
  4. 4 Purdue Model Example
  5. 5 Dragos Process
  6. 6 Dragos Sources
  7. 7 Answer the Three Questions
  8. 8 Do we understand the vulnerability?
  9. 9 Prioritization
  10. 10 Dragos Threat Score
  11. 11 Rockwell Automation Connected Components Workbench
  12. 12 General Electric Communicator
  13. 13 Patching
  14. 14 Mitigation
  15. 15 Risk-Based Approach
  16. 16 Monitoring
  17. 17 Recommendations for Vendors and ICS-CERT

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.