Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies
Dragos: ICS Cybersecurity via YouTube
Overview
Syllabus
Intro
Key Findings
Goofy Venn Diagram
Purdue Model Example
Dragos Process
Dragos Sources
Answer the Three Questions
Do we understand the vulnerability?
Prioritization
Dragos Threat Score
Rockwell Automation Connected Components Workbench
General Electric Communicator
Patching
Mitigation
Risk-Based Approach
Monitoring
Recommendations for Vendors and ICS-CERT
Taught by
Dragos: ICS Cybersecurity