Developing a Converged IT/OT Threat Model Using MITRE ATT&CK

Developing a Converged IT/OT Threat Model Using MITRE ATT&CK

Dragos: ICS Cybersecurity via YouTube Direct link

Intro

1 of 19

1 of 19

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Developing a Converged IT/OT Threat Model Using MITRE ATT&CK

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Risk Management
  4. 4 Threat Based Approach
  5. 5 The Process
  6. 6 Threat Modeling Process
  7. 7 Why ATTCK
  8. 8 Analysis of ATTCK
  9. 9 Attack for ICS Matrix
  10. 10 Summary
  11. 11 Resources
  12. 12 Where does the ICs chain start
  13. 13 Does MITRE have a rating associated with the attacks
  14. 14 Are there any forensics products that attempt to track down the exact source
  15. 15 How do we verify the information without compromising the production
  16. 16 Red Canary
  17. 17 Lightning Round
  18. 18 Compliance Frameworks
  19. 19 Red Team Blue Team Collaboration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.