How Long to Boom: Understanding and Measuring ICS Hacker Maturity


Posted on in Presentations

The industrial control system threat is growing quickly. But ICS hackers do not start by disrupting electric grids. Instead, they mature predictably leading them from things that go bad, to things that go boom. Using ICS threat intelligence we’ve developed an ICS hacker maturity model enabling us to determine how much risk a threat poses and predict how long until they reach maximum risk.

Learning Objectives:
1: Understand and differentiate between risks in industrial control and critical infrastructure threats.
2: Learn the different levels of threat maturity and how to map them to environment risk.
3: Know how to estimate how long a threat will take to reach future maturity levels.

Participants
Sergio Caltagirone

Participant

Director, Threat Intelligence, Dragos

Hackers & Threats

threat management threat intelligence risk management operational technology (OT Security) critical infrastructure


Topic

Subtopic


Share With Your Community