O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3

ACTIONABLE ICS THREAT INTELLIGENCE THROUGH THREAT MODELING

Simply put, threat intelligence is information about potential threats that not only could pose a risk to your organization and/or systems, but has also been analyzed, correlated, and processed in a way that is of operational value to your organization. Over the last few years, the term threat intelligence has emerged as one of the latest in a plethora of ICS cybersecurity buzzwords. Of course, we now have threat intelligence and actionable threat intelligence, adding even more “marketability.” To be fair, in the context of an overall comprehensive cybersecurity program, threat intelligence is in fact very important, as long as it is accurate ... and relevant as well (more ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required