How Long to Boom: Understanding and Measuring ICS Hacker Maturity


Posted on in Presentations

The industrial control system threat is growing quickly. But ICS hackers do not start by disrupting electric grids. Instead, they mature predictably leading them from things that go bad, to things that go boom. Using ICS threat intelligence we’ve developed an ICS hacker maturity model enabling us to determine how much risk a threat poses and predict how long until they reach maximum risk.

Learning Objectives:
1: Understand and differentiate between risks in industrial control and critical infrastructure threats.
2: Learn the different levels of threat maturity and how to map them to environment risk.
3: Know how to estimate how long a threat will take to reach future maturity levels.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Sergio Caltagirone

Participant

Director, Threat Intelligence, Dragos


Share With Your Community