Главная
Study mode:
on
1
Intro
2
Key Findings
3
Goofy Venn Diagram
4
Purdue Model Example
5
Dragos Process
6
Dragos Sources
7
Answer the Three Questions
8
Do we understand the vulnerability?
9
Prioritization
10
Dragos Threat Score
11
Rockwell Automation Connected Components Workbench
12
General Electric Communicator
13
Patching
14
Mitigation
15
Risk-Based Approach
16
Monitoring
17
Recommendations for Vendors and ICS-CERT
Description:
Explore the critical aspects of Industrial Control Systems (ICS) vulnerabilities in this 24-minute conference talk from the DISC-SANS ICS Virtual Conference. Delve into the 2019 vulnerability year in review report with Katherine Vajda, Dragos Senior Intelligence and Vulnerability Analyst. Gain insights on processes and drivers for prioritizing and understanding vulnerability risks within ICS environments. Learn how to maximize return on investment for mitigation efforts. Examine key findings, the Purdue Model, and Dragos' approach to vulnerability assessment. Understand the importance of answering crucial questions about vulnerabilities, prioritization techniques, and the Dragos Threat Score. Analyze specific examples involving Rockwell Automation and General Electric products. Explore patching, mitigation strategies, risk-based approaches, and monitoring techniques. Conclude with valuable recommendations for vendors and ICS-CERT to enhance overall ICS cybersecurity.

Evaluating ICS Vulnerabilities - Prioritization and Mitigation Strategies

Dragos: ICS Cybersecurity
Add to list