Lessons from Applying MITRE ATT&CK in the Wild

Posted on in Presentations

MITRE’s freely available ATT&CK knowledge base has increasingly become “the language” for describing adversary behavior. This panel will feature experts from organizations that use ATT&CK in their operations, products and services, discussing what works, what doesn’t and how to achieve measurable improvements in your security posture through the use of adversary knowledge.

Learning Objectives:
1: Understand how to use the adversary behavior described in ATT&CK in your cyber-defense operations
2: Learn how other organizations use ATT&CK and what lessons they’ve learned in the process.
3: Be able to quickly apply adversary understanding in your organization.

Attendees should have a firm grasp of IT security principles and ideally some basic understanding of what adversary behavior is.

Jessica Payne


Security Person, Microsoft

Rachael Schweizer


Cybersecurity Analytics Lead, Pfizer

Richard Struse


CTO, Tidal Cyber Inc.

David Westgard


Lead Engineer, Cyber Security, Target

Share With Your Community