MITRE has released its 2022 ATT&CK Evaluations after testing how different security vendors detect and respond to adversaries, their tactics, and their techniques. It's one important way we all get better.
Using the ATT&CK knowledge base, MITRE emulated two data encryption scenarios, modeling tactics and techniques leveraged by the Wizard Spider and Sandworm APT groups.
You have to really know how to interpret these evaluations, and we're here to help in the following ways:
-We'll cover practical ways you can use the latest MITRE ATT&CK Evaluation to protect your organization
-While this webcast will cover Rapid7's performance with InsightIDR, the larger purpose is to remove complexity, confusion and noise so you can make decisions
-What you get: the ability to interpret findings, and think through what actions to take
It would be hard to find more experienced, credible guides:
Dan Martin is a security veteran who leads the endpoint team at Rapid7. He came to us from threat intelligence for the US government and enterprises. Jeffrey Gardner is a former CISO who advises our detection and response practice. You may know Jeffrey from our vlog series "The Lost Bots."