Главная
Study mode:
on
1
Intro
2
Agenda
3
Solar Winds
4
Solar Winds Compromise
5
What Happened
6
Two Types of Operations
7
What Does This Mean
8
Our Recommendations
9
What We Dont Know
10
Recommendations
11
Solar Winds Example
12
GE Example
13
Gain Visibility
14
DNS Query
15
Analyzing Compromised Environment
16
Digital Forensics Instant Response
17
Digital Forensics Virtual System
18
NERC Implications
19
Three Step Standards
20
Collection Management Framework
21
Questions
22
Collecting Forensic Evidence
23
Supernova
24
What to do
Description:
Explore the critical implications of the SolarWinds compromise on ICS/OT networks in this 57-minute webinar by Dragos: ICS Cybersecurity. Gain insights into the sophisticated supply chain attack that affected 18,000 organizations worldwide, with a focus on industrial environments. Learn about the two types of operations involved, potential impacts, and receive expert recommendations for identifying and remediating affected systems. Discover strategies for gaining visibility, analyzing compromised environments, and conducting digital forensics. Understand the NERC implications and three-step standards for addressing the breach. Dive into specific examples, including the GE case, and explore the Supernova malware. Leave equipped with actionable knowledge on collecting forensic evidence and implementing effective cybersecurity measures to protect industrial control systems.

SolarWinds Compromise: Impact on ICS/OT Networks and Remediation Strategies

Dragos: ICS Cybersecurity
Add to list