The ABCs of Threat Activity Groups - Understanding and Analyzing Cyber Threats
Dragos: ICS Cybersecurity via YouTube
Overview
Explore the world of threat activity groups in this 54-minute webinar featuring Sergio Caltagirone, VP of Threat Intelligence at Dragos, and Dave Bittner, Producer and Host of The Cyberwire Podcast. Delve into the importance, identification, and analysis of these groups while examining key concepts such as the Diamond Model, Kill Chain, and Activity Group Life Cycle. Gain insights on activity group creation, families, and naming schemes. Discuss attribution challenges, the role of federal organizations, and the significance of intelligence versus data. Address topics like false flags, kinetic impacts, and criminology to enhance your understanding of cybersecurity threats in industrial control systems.
Syllabus
Introduction
The Diamond Model
The Kill Chain
Activity Groups
Life Cycle
Activity Group Creation
Why Activity Groups Matter
Activity Group Families
Attribution
Soft pushback
Naming schemes
Will there be a federal organization
Is attribution important
Data vs Intelligence
False Flags
Kinetic
Criminology
Taught by
Dragos: ICS Cybersecurity