<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Guarding the Grid: Defending Operational Technology with ATT&amp;amp;CK in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Guarding-the-Grid-Defending-Operational-Technology-with-ATT-amp/m-p/73256#M7134</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Critical infrastructure such as electrical generation facilities, water treatment plants, and transportation systems are a lifeline for our communities. Unfortunately, this dependence has made critical infrastructure a prime target for threat actors. Furthermore, these systems often lack security measures we see in enterprise networks, making them easier to attack. By identifying the threat landscape and communicating adversary behaviors affecting information technology (IT) and operational technology (OT) systems, organizations can evaluate and employ security controls for real-world adversary behaviors targeting those environments.&lt;/P&gt;&lt;P class=""&gt;In collaboration with &lt;A class="" href="https://attackiq.com/" target="_blank" rel="noopener ugc nofollow"&gt;AttackIQ&lt;/A&gt;, &lt;A class="" href="http://www.bah.com" target="_blank" rel="noopener ugc nofollow"&gt;Booz Allen Hamilton&lt;/A&gt;, &lt;A class="" href="https://www.ensigninfosecurity.com/" target="_blank" rel="noopener ugc nofollow"&gt;Ensign InfoSecurity&lt;/A&gt;, &lt;A class="" href="https://www.globalcyberalliance.org/" target="_blank" rel="noopener ugc nofollow"&gt;Global Cyber Alliance&lt;/A&gt; and &lt;A class="" href="https://www.siemens.com/global/en/company/about.html" target="_blank" rel="noopener ugc nofollow"&gt;Siemens&lt;/A&gt;, the Center for Threat-Informed Defense created &lt;A class="" href="https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/defending-ot-with-attack/" target="_blank" rel="noopener ugc nofollow"&gt;Defending OT with ATT&amp;amp;CK&lt;/A&gt; to identify and defend against adversarial techniques that impact operations on critical infrastructure. We created three resources to identify assets and technologies in complex IT/OT environments and present an approach to comprehensively identify adversarial behaviors targeting those systems.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://medium.com/mitre-engenuity/guarding-the-grid-defending-operational-technology-with-att-ck-ba844a85066e" target="_blank" rel="noopener"&gt;https://medium.com/mitre-engenuity/guarding-the-grid-defending-operational-technology-with-att-ck-ba844a85066e&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Tue, 20 Aug 2024 02:26:33 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-08-20T02:26:33Z</dc:date>
    <item>
      <title>Guarding the Grid: Defending Operational Technology with ATT&amp;CK</title>
      <link>https://community.isc2.org/t5/Industry-News/Guarding-the-Grid-Defending-Operational-Technology-with-ATT-amp/m-p/73256#M7134</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Critical infrastructure such as electrical generation facilities, water treatment plants, and transportation systems are a lifeline for our communities. Unfortunately, this dependence has made critical infrastructure a prime target for threat actors. Furthermore, these systems often lack security measures we see in enterprise networks, making them easier to attack. By identifying the threat landscape and communicating adversary behaviors affecting information technology (IT) and operational technology (OT) systems, organizations can evaluate and employ security controls for real-world adversary behaviors targeting those environments.&lt;/P&gt;&lt;P class=""&gt;In collaboration with &lt;A class="" href="https://attackiq.com/" target="_blank" rel="noopener ugc nofollow"&gt;AttackIQ&lt;/A&gt;, &lt;A class="" href="http://www.bah.com" target="_blank" rel="noopener ugc nofollow"&gt;Booz Allen Hamilton&lt;/A&gt;, &lt;A class="" href="https://www.ensigninfosecurity.com/" target="_blank" rel="noopener ugc nofollow"&gt;Ensign InfoSecurity&lt;/A&gt;, &lt;A class="" href="https://www.globalcyberalliance.org/" target="_blank" rel="noopener ugc nofollow"&gt;Global Cyber Alliance&lt;/A&gt; and &lt;A class="" href="https://www.siemens.com/global/en/company/about.html" target="_blank" rel="noopener ugc nofollow"&gt;Siemens&lt;/A&gt;, the Center for Threat-Informed Defense created &lt;A class="" href="https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/defending-ot-with-attack/" target="_blank" rel="noopener ugc nofollow"&gt;Defending OT with ATT&amp;amp;CK&lt;/A&gt; to identify and defend against adversarial techniques that impact operations on critical infrastructure. We created three resources to identify assets and technologies in complex IT/OT environments and present an approach to comprehensively identify adversarial behaviors targeting those systems.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://medium.com/mitre-engenuity/guarding-the-grid-defending-operational-technology-with-att-ck-ba844a85066e" target="_blank" rel="noopener"&gt;https://medium.com/mitre-engenuity/guarding-the-grid-defending-operational-technology-with-att-ck-ba844a85066e&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 02:26:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Guarding-the-Grid-Defending-Operational-Technology-with-ATT-amp/m-p/73256#M7134</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-08-20T02:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: Guarding the Grid: Defending Operational Technology with ATT&amp;CK</title>
      <link>https://community.isc2.org/t5/Industry-News/Guarding-the-Grid-Defending-Operational-Technology-with-ATT-amp/m-p/73274#M7136</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 14:48:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Guarding-the-Grid-Defending-Operational-Technology-with-ATT-amp/m-p/73274#M7136</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-08-20T14:48:03Z</dc:date>
    </item>
  </channel>
</rss>

