Posted on
in Presentations
The industrial control system threat is growing quickly. But ICS hackers do not start by disrupting electric grids. Instead, they mature predictably leading them from things that go bad, to things that go boom. Using ICS threat intelligence we’ve developed an ICS hacker maturity model enabling us to determine how much risk a threat poses and predict how long until they reach maximum risk.
Learning Objectives:
1: Understand and differentiate between risks in industrial control and critical infrastructure threats.
2: Learn the different levels of threat maturity and how to map them to environment risk.
3: Know how to estimate how long a threat will take to reach future maturity levels.
Learning Objectives:
1: Understand and differentiate between risks in industrial control and critical infrastructure threats.
2: Learn the different levels of threat maturity and how to map them to environment risk.
3: Know how to estimate how long a threat will take to reach future maturity levels.
Hackers & Threats
threat management threat intelligence risk management operational technology (OT Security) critical infrastructure
Topic
Hackers & Threats
Subtopic
threat management
threat intelligence
risk management
operational technology (OT Security)
critical infrastructure
Share With Your Community