How Security Teams Use the MITRE ATT&CK Framework for ICS

The MITRE ATT&CK Framework for Industrial Control Systems (ICS) classifies malicious cybersecurity events against an operational technology (OT) environment.

The community-sourced framework is designed to describe the course of action an adversary might follow, and create a knowledge base of threat actor behaviors. Security teams can use this information to enhance their organization’s security strategies and policies.

Watch this webinar to learn about:

• Differences between MITRE ATT&CK for IT and MITRE ATT&CK  for ICS

• MITRE ATT&CK framework complexities to watch out for

• How to use the MITRE ATT&CK framework to protect ICS environments

View Resource

Speakers

How Security Teams Use the MITRE ATT&CK Framework for ICS

How Security Teams Use the MITRE ATT&CK Framework for ICS

The MITRE ATT&CK Framework for Industrial Control Systems (ICS) classifies malicious cybersecurity events against an operational technology (OT) environment.

The community-sourced framework is designed to describe the course of action an adversary might follow, and create a knowledge base of threat actor behaviors. Security teams can use this information to enhance their organization’s security strategies and policies.

Watch this webinar to learn about:

• Differences between MITRE ATT&CK for IT and MITRE ATT&CK  for ICS

• MITRE ATT&CK framework complexities to watch out for

• How to use the MITRE ATT&CK framework to protect ICS environments

Speakers

How Security Teams Use the MITRE ATT&CK Framework for ICS

The MITRE ATT&CK Framework for Industrial Control Systems (ICS) classifies malicious cybersecurity events against an operational technology (OT) environment.

The community-sourced framework is designed to describe the course of action an adversary might follow, and create a knowledge base of threat actor behaviors. Security teams can use this information to enhance their organization’s security strategies and policies.

Watch this webinar to learn about:

• Differences between MITRE ATT&CK for IT and MITRE ATT&CK  for ICS

• MITRE ATT&CK framework complexities to watch out for

• How to use the MITRE ATT&CK framework to protect ICS environments

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.