Offline dengan aplikasi Player FM !
How to Use the MITRE ATT&CK Framework
Manage episode 272668731 series 2792612
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS.
Here are links to the security resources mentioned during the session:
- Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IOT Threat Response
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Research Report: OT/IoT Security Report 2020 1H
- Blog: NSA and CISA Call for Action to Lower OT/IoT Cybersecurity Exposure
- Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports
49 episode
Manage episode 272668731 series 2792612
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS.
Here are links to the security resources mentioned during the session:
- Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IOT Threat Response
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Research Report: OT/IoT Security Report 2020 1H
- Blog: NSA and CISA Call for Action to Lower OT/IoT Cybersecurity Exposure
- Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports
49 episode
Semua episode
×Selamat datang di Player FM!
Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.