Are you applying the MITRE ATT&CK for ICS Matrix like you should be? Using the supply chain compromise scenario that we outlined in a recent blog post, we explain how ICS asset owners can leverage diverse data collection methods to create a threat-informed defense using the MITRE ATT&CK for ICS Matrix.
As we break down the rest of the MITRE ATT&CK tactics from this supply chain compromise and how to detect them, we also give you helpful tips on optimizing your use of the MITRE ATT&CK for ICS Matrix. In this video, we cover:
Take an in-depth look at Industrial Defender with our team of experts.
Sign up for our newsletter to receive the latest
Industrial Defender news, updates and content.