Главная
Study mode:
on
1
Introduction
2
Jon Lavender
3
Threat Hunting
4
What is Threat Hunting
5
Sliding Scale of Cybersecurity
6
How to Get Started
7
Hunting Maturity
8
Threat Hunting Jawbreaker
9
How do we start
10
Generating hypotheses
11
Threat Intelligence Inspire Hypothesis
12
Situational Awareness Inspire Hypothesis
13
Demesne Expertise
14
ICS
15
Whats Wrong
16
Fake Case Studies
17
BTC Pipeline Attack
18
Cyberkill Chains
19
Case Study Ukraine
20
Case Study UK
21
Case Study Norway
22
Case Study Naval Ship
23
Sample Hypothesis
24
Recap
25
Giveaway
Description:
Explore industrial control systems (ICS) and SCADA threat hunting techniques in this comprehensive conference talk from BSides Augusta 2016. Delve into the fundamentals of threat hunting, including its definition, the sliding scale of cybersecurity, and how to initiate a threat hunting program. Learn about hunting maturity and the threat hunting jawbreaker model. Discover methods for generating hypotheses using threat intelligence, situational awareness, and domain expertise specific to ICS environments. Examine real-world case studies from Ukraine, the UK, Norway, and a naval ship incident to understand common attack patterns. Gain practical insights on developing sample hypotheses and implementing effective threat hunting strategies in critical infrastructure environments.

ICS SCADA Threat Hunting

Add to list