Star 0

Abstract

The industrial control system threat is growing quickly. But ICS hackers do not start by disrupting electric grids. Instead, they mature predictably leading them from things that go bad, to things that go boom. Using ICS threat intelligence we’ve developed an ICS hacker maturity model enabling us to determine how much risk a threat poses and predict how long until they reach maximum risk.Learning Objectives:1: Understand and differentiate between risks in industrial control and critical infrastructure threats.2: Learn the different levels of threat maturity and how to map them to environment risk.3: Know how to estimate how long a threat will take to reach future maturity levels.