Главная
Study mode:
on
1
Intro
2
Agenda
3
Risk Management
4
Threat Based Approach
5
The Process
6
Threat Modeling Process
7
Why ATTCK
8
Analysis of ATTCK
9
Attack for ICS Matrix
10
Summary
11
Resources
12
Where does the ICs chain start
13
Does MITRE have a rating associated with the attacks
14
Are there any forensics products that attempt to track down the exact source
15
How do we verify the information without compromising the production
16
Red Canary
17
Lightning Round
18
Compliance Frameworks
19
Red Team Blue Team Collaboration
Description:
Explore an offense-informed defense approach to managing converged IT/OT cyber risk in this 56-minute webinar by Dragos and The Chertoff Group. Learn how to develop a converged threat model using the MITRE ATT&CK framework, including the recently released ATT&CK for ICS knowledge base. Discover threat modeling techniques across IT and OT networks, and gain insights on building a unified cyber defense strategy. Delve into topics such as risk management, the threat-based approach, and the threat modeling process. Analyze the ATT&CK for ICS matrix and explore resources for implementation. Address key questions about the ICS attack chain, MITRE's attack ratings, forensics products for source tracking, and information verification in production environments. Gain knowledge on compliance frameworks and the importance of Red Team-Blue Team collaboration in strengthening cybersecurity defenses.

Developing a Converged IT/OT Threat Model Using MITRE ATT&CK

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00