ICS Security Crucible: Forging Programmatic Armor and Weapons for Industrial Operations
Dragos: ICS Cybersecurity via YouTube
Overview
Explore an innovative approach to industrial control system (ICS) security in this 29-minute conference talk. Discover the "ICS Security Crucible" concept, which integrates people, processes, and technology to craft tailored defenses for industrial operations. Learn how to address unique risks, impacts, budgets, and known threats through real-world use cases. Gain practical insights for developing or enhancing an ICS-specific security program, including the importance of using appropriate tools, understanding maturity models, and implementing effective governance, risk, and compliance (GRC) strategies. Delve into the challenges of ICS security and uncover solutions for building a robust defense framework tailored to your organization's specific needs.
Syllabus
Intro
Why is ICS security so difficult
Using the wrong tools
What is a crucible
mace
shield
bow
swords
build that out
roadmap
Maturity Model
The Crucible
GRC
Standards
Automation
The Right Tools
Define the Crucible
Taught by
Dragos: ICS Cybersecurity