{"id":17932,"date":"2020-03-17T20:35:32","date_gmt":"2020-03-18T04:35:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11665\/"},"modified":"2020-03-17T20:35:32","modified_gmt":"2020-03-18T04:35:32","slug":"news-11665","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11665\/","title":{"rendered":"VB2019 presentation: Nexus between OT and IT threat intelligence"},"content":{"rendered":"<p>Cyber attacks on industrial control systems (ICS) include the well-known stories of Stuxnet and <a href=\"https:\/\/www.virusbulletin.com\/conference\/vb2016\/abstracts\/blackenergy-what-we-really-know-about-notorious-cyber-attacks\/\" target=\"_blank\">BlackEnergy<\/a> and such attacks appear to be getting more prevalent. Late last year, a natural gas compression facility at a US pipeline operator was <a href=\"https:\/\/dragos.com\/blog\/industry-news\/assessment-of-ransomware-event-at-u-s-pipeline-operator\/\" target=\"_blank\">targeted with ransomware<\/a>.<\/p>\n<p>Operational Technology (OT), the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences that matter to those researching ICS threats and attacks. During the Threat Intelligence Practitioners\u2019 Summit at VB2019, <em>Dragos<\/em> cyber threat intelligence analyst Selena Larson gave a keynote detailing these similarities and differences.<\/p>\n<p>Today we publish the recording of Selena\u2019s presentation.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\" width=\"100%\" height=\"420\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/Bx9V6r2YRH4\" frameborder=\"0\" width=\"100%\" height=\"420\" style=\"\"> <\/iframe><\/p>\n<p>\u00a0<\/p>\n<p><em>Have you researched threats against ICS or built tools ICS defenders can use to monitor their systems? Why not <a title=\"Call for papers\" href=\"https:\/\/www.virusbulletin.com\/conference\/vb2020\/call-papers\/\">submit a paper<\/a> for <a title=\"VB2020\" href=\"https:\/\/www.virusbulletin.com\/conference\/vb2020\/\">VB2020<\/a> in Dublin? The call for papers closes <strong>15 March<\/strong>!<\/em><\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/03\/vb2019-presentation-nexus-between-ot-and-it-threat-intelligence\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>                                 Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners\u2019 Summit at VB2019, Dragos cyber threat intelligence analyst Selena Larson gave a keynote on these similarities and differences. Today we release the recording of her presentation.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/03\/vb2019-presentation-nexus-between-ot-and-it-threat-intelligence\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-17932","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17932"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17932\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17932"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}