Главная
Study mode:
on
1
Intro
2
CTI Key Takeaways
3
CTI Data Sources
4
Components of Good Threat Intelligence
5
CTI, applied NIST Cybersecurity Framework
6
ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
7
What does this shift mean for ICS defenders?
8
Planning & Direction - PIRS
9
Processing and Analysis - TIA Assessment
10
Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
11
USE CASE - THREAT DETECTION
12
USE CASE - THREAT HUNTING
13
USE CASE - INCIDENT RESPONSE
14
USE CASE - VULN MANAGEMENT
15
USE CASE - SOCIALIZATION OF THREATS
16
USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
17
USE CASE - RESPOND TO RFIS
18
USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING
Description:
Explore how to effectively operationalize Industrial Control Systems (ICS) threat intelligence in this 49-minute webinar. Learn why industrial organizations should prioritize ICS threat intelligence, discover the most valuable use cases to develop, and understand how it can drive stakeholder support. Gain insights into the shifting ICS cyber threat landscape, which now targets private industry, and explore various approaches to operationalize intelligence across different roles. Delve into key topics such as CTI data sources, components of good threat intelligence, and its application to the NIST Cybersecurity Framework. Examine specific use cases including threat detection, hunting, incident response, vulnerability management, and justification of OT cybersecurity investments. Understand how to assess defenses, conduct red teaming, and respond to RFIs using ICS threat intelligence.

How to Operationalize ICS Threat Intelligence for Defenders

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00