Cybercrime , Fraud Management & Cybercrime , Malware as-a-Service
Why a Common Language is Critical: Understanding the MITRE ATT&CK Framework
In this on-demand webinar, a panel of experts from eSentire and VMware Carbon Black discuss how the MITRE ATT&CK framework can be leveraged to better understand the tactics and techniques used by threat hunters and defenders to classify attacks and assess an organization's risk.
Key Learnings
- Understand real-world adversarial behavior in a structured way: WHAT attackers are trying to achieve (tactics) and HOW (techniques)
- Understand your risks, define your defense strategies, know where you lack coverage/visibility and develop plans to mitigate or remediate
- How to avoid a false sense of security by relying solely on coverage by the matrix. The MITRE ATT&CK framework is not a prescriptive checklist; there are many alternate ways to implement techniques and not all tactics and techniques are codified within the framework itself
- How to use the combination of people, processes and technology to detect threats, understand their impact and quickly respond and adapt