MITRE ATT&CK: Take Your SIEM and Insider Threat Detection to the Next Level

Logo
Presented by

Oleg Kolesnikov, VP Threat Research, Securonix Threat Research Labs and Sujay Doshi, Product Manager, Content and Threat

About this talk

The MITRE ATT&CK framework is seeing rapid adoption across security teams worldwide. Join Oleg Kolesnikov and Sujay Doshi as they discuss key insights into how you can better leverage the framework from a SIEM and insider threat/user and entity behavior analytics (UEBA) perspective. Viewers will also be shown practical examples of the most prevalent MITRE ATT&CK techniques in real-world attacks, as well as share technical insights into how you can better leverage the framework as part of your organization. Join this webinar to discover: - What some of the most prevalent real-world MITRE ATT&CK techniques – including Kerberoasting, DCShadow, and lateral movement using administrative shares – look like in your logs, and how you can detect them in your environment. - What are the key considerations when it comes to leveraging MITRE ATT&CK as part of your SIEM and/or insider threat/UEBA environment. - How Securonix is aligning content to the MITRE ATT&CK framework in order to improve threat detection and threat hunting capabilities.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (76)
Subscribers (14859)
Securonix Next-Gen SIEM and XDR deliver threat detection and response powered by flexible, cloud-native advanced analytics. Follow this channel to learn from our security experts. They will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, NTA, SIEM, UEBA, XDR, and SOAR.