[APAC] Use Threat Research & MITRE ATT&CK to Turn Analysis into Action

Logo
Presented by

Dan Kaiser and Sally Vincent from LogRhythm Labs

About this talk

Looking to turn third-party threat research into actionable takeaways for your team? Dan Kaiser and Sally Vincent from LogRhythm Labs walk through their process for reviewing third party reports using the real-world example of Maze ransomware. They demonstrate how threat research can be truly useful in protecting your organization from the latest developments in cyberattacks. Discover how to: - Turn threat details into new monitoring and threat hunting techniques - Configure your security solution to incorporate those actionable takeaways - Use samples of Maze that have been reverse engineered to test your newly configured solution They also demonstrate how to map third-party threat reports to ATT&CK techniques that can be used to develop mitigation, detection and response actions including: - Initial Access - Execution - Persistence - Privilege Escalation - Discovery - Lateral Movement - Impact Save your seat to learn how to make the most of threat research.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76931)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com