Главная
Study mode:
on
1
Introduction
2
The Diamond Model
3
The Kill Chain
4
Activity Groups
5
Life Cycle
6
Activity Group Creation
7
Why Activity Groups Matter
8
Activity Group Families
9
Attribution
10
Soft pushback
11
Naming schemes
12
Will there be a federal organization
13
Is attribution important
14
Data vs Intelligence
15
False Flags
16
Kinetic
17
Criminology
Description:
Explore the world of threat activity groups in this 54-minute webinar featuring Sergio Caltagirone, VP of Threat Intelligence at Dragos, and Dave Bittner, Producer and Host of The Cyberwire Podcast. Delve into the importance, identification, and analysis of these groups while examining key concepts such as the Diamond Model, Kill Chain, and Activity Group Life Cycle. Gain insights on activity group creation, families, and naming schemes. Discuss attribution challenges, the role of federal organizations, and the significance of intelligence versus data. Address topics like false flags, kinetic impacts, and criminology to enhance your understanding of cybersecurity threats in industrial control systems.

The ABCs of Threat Activity Groups - Understanding and Analyzing Cyber Threats

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00