Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Dragos: ICS Cybersecurity via YouTube Direct link

Dragos Threat Score

10 of 17

10 of 17

Dragos Threat Score

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Key Findings
  3. 3 Goofy Venn Diagram
  4. 4 Purdue Model Example
  5. 5 Dragos Process
  6. 6 Dragos Sources
  7. 7 Answer the Three Questions
  8. 8 Do we understand the vulnerability?
  9. 9 Prioritization
  10. 10 Dragos Threat Score
  11. 11 Rockwell Automation Connected Components Workbench
  12. 12 General Electric Communicator
  13. 13 Patching
  14. 14 Mitigation
  15. 15 Risk-Based Approach
  16. 16 Monitoring
  17. 17 Recommendations for Vendors and ICS-CERT

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.