Главная
Study mode:
on
1
Intro
2
Why is ICS security so difficult
3
Using the wrong tools
4
What is a crucible
5
mace
6
shield
7
bow
8
swords
9
build that out
10
roadmap
11
Maturity Model
12
The Crucible
13
GRC
14
Standards
15
Automation
16
The Right Tools
17
Define the Crucible
Description:
Explore an innovative approach to industrial control system (ICS) security in this 29-minute conference talk. Discover the "ICS Security Crucible" concept, which integrates people, processes, and technology to craft tailored defenses for industrial operations. Learn how to address unique risks, impacts, budgets, and known threats through real-world use cases. Gain practical insights for developing or enhancing an ICS-specific security program, including the importance of using appropriate tools, understanding maturity models, and implementing effective governance, risk, and compliance (GRC) strategies. Delve into the challenges of ICS security and uncover solutions for building a robust defense framework tailored to your organization's specific needs.

ICS Security Crucible: Forging Programmatic Armor and Weapons for Industrial Operations

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00