
MITRE ATT&CK®
Compromising the perimeter


Following on from the introductory “MITRE ATT&CK® - An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.
We will see how an attack can be mapped to the Techniques and Tactics within the MITRE ATT&CK® Framework; and how this then leads to improvements in detection and mitigation processes.