Posted on
in Presentations
MITRE’s freely available ATT&CK knowledge base has increasingly become “the language” for describing adversary behavior. This panel will feature experts from organizations that use ATT&CK in their operations, products and services, discussing what works, what doesn’t and how to achieve measurable improvements in your security posture through the use of adversary knowledge.
Learning Objectives:
1: Understand how to use the adversary behavior described in ATT&CK in your cyber-defense operations
2: Learn how other organizations use ATT&CK and what lessons they’ve learned in the process.
3: Be able to quickly apply adversary understanding in your organization.
Pre-Requisites:
Attendees should have a firm grasp of IT security principles and ideally some basic understanding of what adversary behavior is.
Learning Objectives:
1: Understand how to use the adversary behavior described in ATT&CK in your cyber-defense operations
2: Learn how other organizations use ATT&CK and what lessons they’ve learned in the process.
3: Be able to quickly apply adversary understanding in your organization.
Pre-Requisites:
Attendees should have a firm grasp of IT security principles and ideally some basic understanding of what adversary behavior is.
Share With Your Community