How to Operationalize ICS Threat Intelligence for Defenders

How to Operationalize ICS Threat Intelligence for Defenders

Dragos: ICS Cybersecurity via YouTube Direct link

USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY

16 of 18

16 of 18

USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Operationalize ICS Threat Intelligence for Defenders

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 CTI Key Takeaways
  3. 3 CTI Data Sources
  4. 4 Components of Good Threat Intelligence
  5. 5 CTI, applied NIST Cybersecurity Framework
  6. 6 ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
  7. 7 What does this shift mean for ICS defenders?
  8. 8 Planning & Direction - PIRS
  9. 9 Processing and Analysis - TIA Assessment
  10. 10 Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
  11. 11 USE CASE - THREAT DETECTION
  12. 12 USE CASE - THREAT HUNTING
  13. 13 USE CASE - INCIDENT RESPONSE
  14. 14 USE CASE - VULN MANAGEMENT
  15. 15 USE CASE - SOCIALIZATION OF THREATS
  16. 16 USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
  17. 17 USE CASE - RESPOND TO RFIS
  18. 18 USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.