Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Launch Your Cybersecurity Career in 6 Months
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore defensive counting techniques for accurately quantifying industrial control system (ICS) exposure on the Internet in this 21-minute conference talk from BSidesLV. Delve into the challenges of distinguishing real ICS devices from honeypots and personal projects when analyzing Internet-connected systems speaking ICS protocols. Learn about the comprehensive analysis process, from data collection to device verification, and understand the importance of contextualizing exposure numbers. Gain insights into why critical thinking is essential when interpreting Internet-based security research, and discover methods for painting a more accurate picture of ICS device exposure in critical infrastructure environments.
Syllabus
Ground Truth, Tue, Aug 6, 17:00 - Tue, Aug 6, CDT
Taught by
BSidesLV