Overview
Explore threat hunting techniques in industrial environments and operational technology systems through this 49-minute conference talk. Gain insights into the unique challenges of securing industrial control systems (ICS) and learn about the Modbus protocol. Discover how to build an effective toolset, generate hypotheses, and codify knowledge for threat detection. Examine a real-life case study and address critical questions surrounding risk assessment and downtime considerations in industrial settings. Develop strategies to navigate the uncertainties inherent in protecting critical infrastructure and industrial control systems.
Syllabus
Introduction
What is ICS
Industrial Environments
What is Threat Hunting
Operational Technology
Systems
Uncertainty
Modbus
Real Life Case Study
Building a toolset
Document hypothesis generation
codify knowledge
questions
the worst answer ever
risk vs downtime
implementation specific