Главная
Study mode:
on
1
Introduction
2
Naming Convention
3
Fancy Names
4
Diamond Events
5
Activity Groups
6
Types of Analytics
7
Creating Activity Groups
8
Classification and Clustering
9
Linking Groups
10
Names
11
Correlation
12
Electric Utility Targeting
13
Final Points
Description:
Explore a comprehensive 45-minute presentation by Dragos on eight threat activity groups targeting industrial companies. Learn about the spectrum of threats, from espionage to direct attacks on human life, and gain insights into Dragos' approach to identifying ICS threats. Discover the role of threat analytics in intelligence-driven strategies and understand why intelligence is crucial for ICS threat detection and response. Join speakers Sergio Caltagirone and Joe Slowik as they delve into naming conventions, fancy names, diamond events, types of analytics, group classification, and correlation techniques. Examine specific cases of electric utility targeting and gather essential final points on industrial cybersecurity.

Uncovering Industrial Control System Threat Activity Groups

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00