Главная
Study mode:
on
1
Intro
2
Introductions
3
Escalation
4
Different ICS Attack-Response Options
5
Asset Owner & Operator Response
6
Intel on Iranian and Russian Attacks
7
XENOTIME Activity Group
8
DYMALLOY Activity Group
9
MAGNALLIUM Activity Group
10
5 Threat Behaviors to identify Now
11
Threat Hunting and Response Planning
12
Hunting & Response: Key Questions
13
Hunting and Responding to Threats
Description:
Explore the escalating cyber tensions between the US, Iran, and Russia in this comprehensive webinar focused on industrial control systems and critical infrastructure security. Gain insights from Dragos Threat Intelligence and Threat Operations Center experts as they discuss current malicious activities, threat intelligence, and recommended defensive strategies. Delve into detailed presentations on various ICS attack-response options, asset owner and operator responses, and specific threat actor groups like XENOTIME, DYMALLOY, and MAGNALLIUM. Learn about five crucial threat behaviors to identify and develop effective threat hunting and response planning techniques. Acquire valuable knowledge on key questions for hunting and responding to threats in the industrial cybersecurity landscape.

Rising Cyber Escalation: US, Iran, Russia ICS Threats and Response

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00