Following on from the introductory “MITRE ATT&CK® – An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.

"*" indicates required fields

Following on from the introductory “MITRE ATT&CK® – An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.

We will see how an attack can be mapped to the Techniques and Tactics within the MITRE ATT&CK® Framework; and how this then leads to improvements in detection and mitigation processes.

Key elements covered in our scenario-building / attack simulation:

# Attack Stage 1: Initial Access – an example of initial entry and two of the techniques used.
# Attack Stage 2: Execution – once initial access has been achieved, a look at how an attack will start to broaden, via the Execution Tactic.
# Attack Stage 3: Persistence – two Techniques that are used to establish connectivity for ongoing access to a Command & Control server.
# Detect & Defend – Mitigations that MITRE ATT&CK® provides, for the individual Techniques used in the stages of our attack scenario.

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.