Gå offline med appen Player FM !
How to Use the MITRE ATT&CK Framework
Manage episode 272668731 series 2792612
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS.
Here are links to the security resources mentioned during the session:
- Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IOT Threat Response
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Research Report: OT/IoT Security Report 2020 1H
- Blog: NSA and CISA Call for Action to Lower OT/IoT Cybersecurity Exposure
- Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports
49 episoder
Manage episode 272668731 series 2792612
Security teams can use the MITRE ATT&CK Framework for ICS to enhance their organization’s security strategies and policies. The framework uses threat modelling to classify malicious cybersecurity events against an OT environment, and to create a knowledge base of potential threat actor behaviors. Find out more about the differences between MITRE for IT and MITRE for ICS.
Here are links to the security resources mentioned during the session:
- Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IOT Threat Response
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Research Report: OT/IoT Security Report 2020 1H
- Blog: NSA and CISA Call for Action to Lower OT/IoT Cybersecurity Exposure
- Webpage: Nozomi Networks Labs – Threat Advisories, Tools, Research Reports
49 episoder
모든 에피소드
×Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.