Lessons from Applying MITRE ATT&CK in the Wild


Posted on in Presentations

MITRE’s freely available ATT&CK knowledge base has increasingly become “the language” for describing adversary behavior. This panel will feature experts from organizations that use ATT&CK in their operations, products and services, discussing what works, what doesn’t and how to achieve measurable improvements in your security posture through the use of adversary knowledge.

Learning Objectives:
1: Understand how to use the adversary behavior described in ATT&CK in your cyber-defense operations
2: Learn how other organizations use ATT&CK and what lessons they’ve learned in the process.
3: Be able to quickly apply adversary understanding in your organization.

Pre-Requisites:
Attendees should have a firm grasp of IT security principles and ideally some basic understanding of what adversary behavior is.


Participants
Jessica Payne

Participant

Security Person, Microsoft

Rachael Schweizer

Participant

Cybersecurity Analytics Lead, Pfizer

Richard Struse

Participant

CTO, Tidal Cyber Inc.

David Westgard

Participant

Lead Engineer, Cyber Security, Target

Security Strategy & Architecture Analytics Intelligence & Response

threat management threat intelligence security operations security analytics practitioner perspectives


Topic

Subtopic


Share With Your Community