Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The ABCs of Threat Activity Groups - Understanding and Analyzing Cyber Threats

Dragos: ICS Cybersecurity via YouTube

Overview

Explore the world of threat activity groups in this 54-minute webinar featuring Sergio Caltagirone, VP of Threat Intelligence at Dragos, and Dave Bittner, Producer and Host of The Cyberwire Podcast. Delve into the importance, identification, and analysis of these groups while examining key concepts such as the Diamond Model, Kill Chain, and Activity Group Life Cycle. Gain insights on activity group creation, families, and naming schemes. Discuss attribution challenges, the role of federal organizations, and the significance of intelligence versus data. Address topics like false flags, kinetic impacts, and criminology to enhance your understanding of cybersecurity threats in industrial control systems.

Syllabus

Introduction
The Diamond Model
The Kill Chain
Activity Groups
Life Cycle
Activity Group Creation
Why Activity Groups Matter
Activity Group Families
Attribution
Soft pushback
Naming schemes
Will there be a federal organization
Is attribution important
Data vs Intelligence
False Flags
Kinetic
Criminology

Taught by

Dragos: ICS Cybersecurity

Reviews

Start your review of The ABCs of Threat Activity Groups - Understanding and Analyzing Cyber Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.