Support

WATCH -- Webinar: Are You Using MITRE ATT&CK for ICS Correctly?

Are you applying the MITRE ATT&CK for ICS Matrix like you should be? Using the supply chain compromise scenario that we outlined in a recent blog post, we explain how ICS asset owners can leverage diverse data collection methods to create a threat-informed defense using the MITRE ATT&CK for ICS Matrix.

As we break down the rest of the MITRE ATT&CK tactics from this supply chain compromise and how to detect them, we also give you helpful tips on optimizing your use of the MITRE ATT&CK for ICS Matrix. In this video, we cover:

  • The specific techniques used in this scenario
  • Our analysis of what went wrong within each
  • The most effective detection methods for each compromise
  • How contextual data reduces MTTR in a threat scenario
Panelists
  • Jeremy Morgan
    Principal Risk & Solutions Consultant, Industrial Defender
  • Dennis Distler
    Principal Consultant, CyPhy Defense

Industrial Defender Demo

Take an in-depth look at Industrial Defender with our team of experts.

Explore More Resources

No items found.