Exclusive Webinar:

Join us Oct. 6 as Rockwell Automation & Dragos CEOs reshape the way you approach cybersecurity in manufacturing.

Skip to main content

Mind the Gap, Bro: Using Network Monitoring to Overcome Lack of Host Visibility

Defenders often find themselves in a position where visibility is either not ideal, or even nonexistent – especially for host artifacts. Using the example of ICS environments, this talk will provide a case study of how network visibility via Bro can be leveraged to gain proxy visibility on the host, with a special emphasis on YARA for file analysis. The same example can be applied to other environments where defenders may have little say in host setup, but effectively control the network.

Discover More Resources Using Keyword Tags
Joe Slowik

Never miss the latest ICS news and insights from our experts.


Watch the next video

Play Button

Inside the cyber threat if Russia invades Ukraine


View Video
Right Arrow

View more videos

Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.