Enterprise Solution Architect and Sales Engineer Karthik Murthy demonstrates how security teams can leverage 5 prevalent MITRE ATT&CK techniques in security monitoring.
Discover how real-world adversaries employ them for undetected infiltration and compromise data, and identify priority areas and potential visibility gaps.
Key Learnings:
• The structure of ATT&CK, comprising tactics, techniques, examples, mitigation, and detection
• How to use ATT&CK to assess, enhance, and test your monitoring, threat detection, and threat hunting efforts
• How to apply five common ATT&CK techniques in your threat detection and hunting practice
• A practical approach to using MITRE ATT&CK to improve offense and defense to ultimately reduce mean time to detect and respond.