Главная
Study mode:
on
1
Intro
2
Background: By the numbers
3
Dragos Timeline
4
What are Safety Instrumentation Systems?
5
Safety Systems
6
Explanation: How it happened
7
Logic Organization - TriStation 1131
8
Appending to a Program
9
First payload is a check payload
10
Egg Hunt and Overwrite Memory
11
Appending TRISIS
12
Program Epilogue
13
Second Logic Upload - Speculation
14
Program Compilation
15
TRISIS Effects
16
TRISIS - Potential Effects
17
Explanation: What comes next
18
Mitigation: How to protect
19
Mitigation: How to defend
20
ICS Cyber Kill Chain
21
Known TRISIS ICS Kill chain
22
The Four Types of Detection
23
Types of Detection - TRISIS
24
Smart Questions to ask
Description:
Explore an in-depth analysis of the TRISIS malware and learn effective strategies to protect Safety Instrumentation Systems (SIS) in this 54-minute conference talk by Dragos: ICS Cybersecurity. Dive into the background, timeline, and technical details of the TRISIS attack, including its impact on safety systems and potential consequences. Gain insights into the malware's logic organization, payload structure, and program compilation process. Discover mitigation techniques, defense strategies, and the ICS Cyber Kill Chain specific to TRISIS. Understand the four types of detection and learn smart questions to ask when assessing your organization's cybersecurity posture. Enhance your knowledge of industrial control system security and develop a comprehensive approach to safeguarding critical infrastructure against sophisticated cyber threats.

Analyzing and Defending Against TRISIS - Safety Instrumentation Systems Cybersecurity

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00