Главная
Study mode:
on
1
Introduction
2
Two Types of Threat Hunting
3
Environment vs Threat Hunting
4
Threat Intel
5
Questions
6
Favorite Threat Intel Feed
7
Using Open Source Reporting
8
Dragos Intel Feed
9
Commercial Intel Feed
10
Technical Reports
11
Activity Groups
12
Baselines
13
Coverage
14
Start the Conversation
15
Tools Techniques Approach
16
Purpose
17
Threat Hunting Model Applied
18
Trend Hunting Model Applied
19
Trend Hunting Approach
20
Lightning Round Question
21
People Process and Technology
Description:
Explore a comprehensive 6-step ICS threat hunting model applied to real-world scenarios in this 1-hour 10-minute webinar. Gain insights from Dragos and SANS Institute experts as they delve into environment vs threat hunting, threat intelligence, and effective tools and techniques. Learn about different types of threat hunting, utilizing various intel feeds, and the importance of baselines and coverage. Discover how to initiate conversations around threat hunting, apply the threat hunting model, and understand the trend hunting approach. Engage with a lightning round of questions and explore the crucial aspects of people, process, and technology in industrial cybersecurity.

Six Steps to Effective ICS Threat Hunting

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00