Six Steps to Effective ICS Threat Hunting

  • Webcast Aired Friday, 22 Nov 2019 1:00PM EST (22 Nov 2019 18:00 UTC)
  • Speakers: Tim Conway, Marc Seitz, Dan Gunter

On November 22 Dragos Principal Threat Analysts Dan Gunter and Marc Seitz will be joined by Tim Conway, Technical Director - ICS and SCADA Programs at SANS, to introduce a 6-step ICS threat hunting model. They'll demonstrate how to apply it to real-world threat hunting scenarios, pinpoint adversary behavior patterns, and stop ICS threats from going undiscovered.

What You'll Learn:

  • Why proactive threat hunting is necessary for ICS cybersecurity defense
  • How to complete effective threat hunting
  • What adversary behavior patterns look like
  • How to apply the model to real world threat hunting scenarios
  • How to measure the effectiveness of threat hunts