Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Don't Cry Wolf - Evidence Based Assessments of ICS Threats

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to hunt, analyze, and assess Industrial Control Systems (ICS) malware threats through evidence-based methodologies in this DEF CON 33 conference talk. Explore the rarity of ICS malware while understanding how significant threats like FrostyGoop, TRISIS, and COSMICENERGY have been discovered in public repositories like VirusTotal. Master the process of distinguishing between benign research tools, CTF materials, obfuscated code, and genuine malicious threats targeting ICS/OT environments. Discover practical hunting techniques using simple yet effective queries to identify potential threats, follow a systematic analysis workflow, and understand appropriate response actions including victim notification procedures. Examine real-world case studies using recently discovered samples to demonstrate the complete threat assessment process. Apply Dragos's ICS malware definition framework to make accurate determinations about whether discovered samples constitute genuine ICS malware threats, helping security professionals avoid false alarms while maintaining vigilance against legitimate industrial cybersecurity risks.

Syllabus

DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson

Taught by

DEFCONConference

Reviews

Start your review of Don't Cry Wolf - Evidence Based Assessments of ICS Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.