May 13, 2022, 5:11 p.m. | /u/Outlander77

cybersecurity www.reddit.com

Right now, my team is walking through each MITRE ATT&CK for ICS Technique to determine if each one is applicable to the client environment. After confirming their applicability, we're going to break down each technique into 1 or more monitoring requirements to hands off to engineering. Curious if anyone has taken an approach like this and could share methodology/etc.?

Reference: [https://attack.mitre.org/techniques/ics/](https://attack.mitre.org/techniques/ics/)

amp att ck cybersecurity down ics mitre mitre att&amp requirements

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Specialist

@ Lely | Maassluis, Netherlands

IT Security Manager (Corporate Security) (REF822R)

@ Deutsche Telekom IT Solutions | Budapest, Hungary

Senior Security Architect

@ Cassa Centrale Banca - Credito Cooperativo Italiano | Trento, IT, 38122

Senior DevSecOps Engineer

@ Raft | Las Vegas, NV (Remote)

Product Manager - Compliance

@ Arctic Wolf | Remote - Colorado