Webinar: Are You Using MITRE ATT&CK for ICS Correctly?

Watch Webinar Recording

Are you applying the MITRE ATT&CK for ICS Matrix like you should be? Using the supply chain compromise scenario that we outlined in our recent blog post, we explain how ICS asset owners can leverage diverse data collection methods to create a threat-informed defense using the MITRE ATT&CK for ICS Matrix.

As we break down the rest of the MITRE ATT&CK tactics from this supply chain compromise and how to detect them, we also give you helpful tips on optimizing your use of the MITRE ATT&CK for ICS Matrix. In this video, we cover:

  • The specific techniques used in this scenario
  • Our analysis of what went wrong within each
  • The most effective detection methods for each compromise
  • How contextual data reduces MTTR in a threat scenario

  • Jeremy Morgan
    Principal Risk & Solutions Consultant, Industrial Defender
  • Dennis Distler
    Principal Consultant, CyPhy Defense