Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to hunt, analyze, and assess Industrial Control Systems (ICS) malware threats through evidence-based methodologies in this DEF CON 33 conference talk. Explore the rarity of ICS malware while understanding how significant threats like FrostyGoop, TRISIS, and COSMICENERGY have been discovered in public repositories like VirusTotal. Master the process of distinguishing between benign research tools, CTF materials, obfuscated code, and genuine malicious threats targeting ICS/OT environments. Discover practical hunting techniques using simple yet effective queries to identify potential threats, follow a systematic analysis workflow, and understand appropriate response actions including victim notification procedures. Examine real-world case studies using recently discovered samples to demonstrate the complete threat assessment process. Apply Dragos's ICS malware definition framework to make accurate determinations about whether discovered samples constitute genuine ICS malware threats, helping security professionals avoid false alarms while maintaining vigilance against legitimate industrial cybersecurity risks.
Syllabus
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson
Taught by
DEFCONConference