Logo Crossweb

Log in

No account yet? Forgot password

Przypomnij hasło

close Wypełnij formularz.
Na Twój adres e-mail zostanie wysłane link umożliwiający zmianę hasła.
Send
This event has already taken place. Check upcoming events

(CS)²AI Online™ Seminar: Dashboarding ICS Threats & Vulnerabilities

csai-online-seminar-dashboarding-ics-threats-vulnerabilities
Event type:
Webinar
Category:
IT
Topic:
Date:
08.05.2024 (wednesday)
Time:
19:00
Language:
English
Price:
Free
City:
Place:
On-line
Address:
On-line
Speakers:
Description:

(CS)²AI Online™ Seminar: The ICS Advisory Project - Dashboarding ICS Threats & Vulnerabilities


The ICS Advisory Project is an innovative open-source initiative founded by Dan Ricci, designed to enhance the cybersecurity posture of OT/ICS environments. It provides a comprehensive dashboard & CSV data format for visualizing DHS CISA ICS Advisories & effectively analyzing vulnerabilities within the OT/ICS community.


This project empowers smaller OT asset owners, CISOs, cybersecurity analysts, & researchers with tools to swiftly pinpoint threats & vulnerabilities by product, vendor, & critical infrastructure sector. It offers invaluable insights into supply chain risks & sector-specific vulnerabilities, streamlining the risk assessment process.


By normalizing vendor names, identifying ICS asset types, & correlating data to the CISA KEV catalog, the ICS Advisory Project significantly reduces the time security analysts spend correlating data from various sources. Its dataset is publicly available on GitHub, fostering a collaborative environment for global users & organizations.


Key takeaways for this discussion:

  1. Project Purpose: The ICS Advisory Project aims to enhance the cybersecurity posture of OT/ICS environments.
  2. Dashboard & Data Format: Provides a comprehensive dashboard & uses CSV data format for visualizing DHS CISA ICS Advisories.
  3. Vulnerability Analysis: Helps analyze OT/ICS community vulnerabilities.
  4. Empowering Smaller Asset Owners: Empowers smaller OT asset owners, CISOs, cybersecurity analysts, & researchers by enabling swift identification of threats & vulnerabilities based on product, vendor, & critical infrastructure sectors.
  5. Supply Chain Insights: Offers insights into supply chain risks & sector-specific vulnerabilities.
  6. Time Efficiency: Normalizing vendor names, identifying ICS asset types, & correlating data reduce security analysts time spent on data correlation.
  7. Publicly Available Dataset: Publicly available dataset (GitHub) fosters collaboration among global users/organizations.

Profile of employers

Similar events