PIPEDREAM - Most Flexible & Capable ICS Malware To Date

Sdílet
Vložit
  • čas přidán 12. 09. 2024

Komentáře • 11

  • @tonio071273
    @tonio071273 Před 2 lety +2

    Great mapping of Pipedream along Purdue and MITRE, thx Mr. Lee!🙌

  • @believe_it712
    @believe_it712 Před 2 lety +3

    Haha love the final part message to the adversaries

  • @aryamargax
    @aryamargax Před 2 lety

    Also a very good point by Robert in regards to predicting threat actors' targeting. It's a waste of time to debate whether you are likely to be targeted or not. Focus on deploying robust security controls and always be prepared for the unexpected.

  • @aryamargax
    @aryamargax Před 2 lety +1

    Schrodinger ICS, haha. Good point to invest more in detection and response as opposed to concentrating all resources on prevention.

  • @aryamargax
    @aryamargax Před 2 lety +1

    Lateral movement monitoring. Not just what comes in and goes out.

  • @aryamargax
    @aryamargax Před 2 lety

    Very interesting that Dragos does not do attribution unless it affects the incident response process. It seems like an efficient way to approach things given that the priority should be to formulate how to properly defend the systems at hand.

  • @aryamargax
    @aryamargax Před 2 lety

    These threat actors are really organized. I didn't know there were separate groups that specialized in access or the activity in itself.

  • @HexaSquirrel
    @HexaSquirrel Před 2 lety

    Great talk, Rob!

  • @fredericoferreira5581
    @fredericoferreira5581 Před 2 lety

    Great talk

  • @ranikehat3913
    @ranikehat3913 Před 2 lety

    Great Talk

  • @The-Blind-Witch
    @The-Blind-Witch Před 2 lety

    Are you certain the adversaries' tradecraft error wasn't intentional as a warning signal from the adversary nation state to the USA?