Overview
Explore an offense-informed defense approach to managing converged IT/OT cyber risk in this 56-minute webinar by Dragos and The Chertoff Group. Learn how to develop a converged threat model using the MITRE ATT&CK framework, including the recently released ATT&CK for ICS knowledge base. Discover threat modeling techniques across IT and OT networks, and gain insights on building a unified cyber defense strategy. Delve into topics such as risk management, the threat-based approach, and the threat modeling process. Analyze the ATT&CK for ICS matrix and explore resources for implementation. Address key questions about the ICS attack chain, MITRE's attack ratings, forensics products for source tracking, and information verification in production environments. Gain knowledge on compliance frameworks and the importance of Red Team-Blue Team collaboration in strengthening cybersecurity defenses.
Syllabus
Intro
Agenda
Risk Management
Threat Based Approach
The Process
Threat Modeling Process
Why ATTCK
Analysis of ATTCK
Attack for ICS Matrix
Summary
Resources
Where does the ICs chain start
Does MITRE have a rating associated with the attacks
Are there any forensics products that attempt to track down the exact source
How do we verify the information without compromising the production
Red Canary
Lightning Round
Compliance Frameworks
Red Team Blue Team Collaboration
Taught by
Dragos: ICS Cybersecurity