Главная
Study mode:
on
1
Intro
2
What is MITRE?
3
Announcing ATT&CK for ICS
4
What is Dragos?
5
Agenda
6
What is ATT&CK?
7
Breaking Down ATT&CK
8
Motivation for ATT&CK for ICS
9
ATT&CK for ICS Technique Matrix
10
Process of Mapping to ATT&CK
11
Find the Behavior
12
Research the Behavior
13
Translate the Behavior into a Tactic
14
Figure Out What Technique Applies
15
Threat Intel Mapping
16
Assessing Coverage
17
Identify Adversary Methodology
18
ICS Access
19
Intrusion, Recon, & Control
20
Attack Delivery & Execution
21
ICS-Specific Impacts
22
Mapping ICS Threats to ATT&CK
23
Typical Defense Development
24
Alternative: Identify 'Weird'
25
Problem: No Context
26
Identifying Threat Behaviors
27
ATT&CK and Threat Behaviors
28
Complete Threat Detection
29
Continuous Development
30
Community Engagement
31
Continued Adversary Evolution
32
Mapping ATT&CK to ICS Threats
33
References & Resources
Description:
Explore the MITRE ATT&CK framework for Industrial Control Systems (ICS) in this 45-minute webinar. Gain insights into how ICS network defenders can leverage a common lexicon for categorizing ICS-specific techniques and threat behaviors to enhance threat detection and response capabilities. Delve into the structure of ATT&CK, its application in ICS environments, and the process of mapping behaviors to tactics and techniques. Learn about threat intelligence mapping, assessing coverage, and identifying adversary methodologies across various ICS attack stages. Discover how to develop comprehensive threat detection strategies, engage with the community, and stay ahead of evolving adversary tactics in the ICS cybersecurity landscape.

MITRE ATT&CK for ICS: Improving Threat Detection and Response in Industrial Control Systems

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00