Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore industrial control systems (ICS) open-source intelligence (OSINT) from an attacker's perspective in this 32-minute RSA Conference talk. Gain insights from Amy Bejtlich and Selena Larson of Dragos, Inc. as they delve into how adversaries leverage freely available data for reconnaissance in planning ICS attacks. Learn about ICS-specific OSINT techniques, key terms, and resources used by attackers. Discover the importance of OSINT in cybersecurity, its various applications, and the process of gathering intelligence. Examine real-world use cases involving vendor links, job postings, energy maps, and LinkedIn profiles. Understand the defender's perspective and the Ellison Collection Vulnerability Matrix to enhance your organization's security posture. Equip yourself with knowledge to decrease your attack surface and increase adversary friction in the realm of industrial control systems.
Syllabus
Introduction
Welcome
Agenda
Definitions
Why Does OSINT Matter
Applications Methods
Resources
Process
Key Terms
Why Target ICS
Open Source Intelligence
Use Cases
Vendor Link
Job Posting
Energy Map
LinkedIn
Defender Perspective
Ellison Collection Vulnerability Matrix
Taught by
RSA Conference
Reviews
5.0 rating, based on 1 Class Central review
Showing Class Central Sort
-
The presenter's are great, worked well together. Their flow in information was well done. I at first believed when I chose this lecture I would be bored and writing it off as irrelevant tome. I’m glad to say it changed my mind quickly. Good Job!,