Contextualizing the MITRE ATT&CK� Framework
The MITRE ATT&CK framework is a powerful tool that provides a language to define, track, and categorize attacker tactics, techniques, and procedures (TTPs). But what if you could use it to gain a deeper understanding of how, why, and when attackers may abuse a technique? By combining threat actor intelligence with the ATT&CK "dictionary," you can add critical context to your detections to increase the effectiveness of your security controls tests and the fidelity of your results.
In this webcast, Matt Bromiley, SANS digital Forensics and Incident Response (DFIR) instructor, describes how you can make the most of ATT&CK and develop a process to read, interpret, contextualize, and test within your environment.
Attendees will learn to:
- Use ATT&CK to read threat intelligence reports and identify key TTPs for control testing.
- Design efficient, lifecycle-appropriate security control tests that increase the fidelity of your results.
- Use control testing to identify and prioritize visibility gaps.
- Determine how your environment would hold up against the latest in attacker techniques.
- Understand the limitations of ATT&CK.
Register today and be among the first to receive the associated whitepaper written by Matt Bromiley.
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Tue, Apr 27, 2021, 10:30am
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
SANS Institute