Главная
Study mode:
on
1
Introduction
2
What is Threat Modeling
3
Three Terms
4
Entry Points
5
How Threat Modeling Works
6
Threat Modeling Methodology
7
Threat Modeling in ICS
8
Methodology to find threats
9
Whats the problem
10
Survey
11
Tools
12
Vision
13
Web Modeling
14
Cyber Security Evaluation Tool
15
Recap
16
Continuous Threat Modeling
17
Advanced Threat Modeling
18
Conclusion
Description:
Explore the benefits of threat modeling in Industrial Control Systems (ICS) through this 26-minute conference talk by Luca Bongiorni, Principal Offensive Security Engineer at Bentley Systems. Discover when to conduct threat modeling, how to implement it effectively, and leverage its results to optimize company resources. Gain insights into threat modeling methodology, tools, and advanced techniques specific to ICS environments. Learn about continuous threat modeling practices and their impact on enhancing overall ICS security posture.

How Threat Modeling Can Influence ICS Security Posture

Kaspersky
Add to list