Finding Real Security Threats in Your Data within the MITRE ATT&CK Framework

Presented by

Jim Van De Ryt, Solutions Architect

About this talk

The MITRE ATT&CK Framework has become the standard knowledge base for helping Security Operations Centers (SOC) manage threats and malicious activity. However, as organizations leverage and adopt MITRE, SOCs continue to struggle with the detection of real and malicious activity threatening their environments. Respond Software offers the Respond Analyst, a fully automated monitoring, detection and investigation solution that is providing SOCs with comprehensive visibility and control in relation to the MITRE ATT&CK Framework. Join this webcast to learn how the Respond Analyst is leveraging the MITRE ATT&CK Framework to: •Detect threats using “integrated reasoning” from multiple security sensors •Reduce or eliminate the need to chase false positives •Scope multiple events into a manageable number of incidents that SOC teams can remediate This webcast will also feature a live demonstration.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (42)
Subscribers (2356)
Respond Software is the cybersecurity investigation automation company and creator of the Respond Analyst, an XDR engine built to accelerate investigations for security operations teams. Defense agencies, government bodies, universities, large enterprises, and leading managed service providers use the Respond Analyst to get investigation power at machine speed. The Respond Analyst works with the broadest range of vendors, sensors, threat intelligence and data repositories in the industry to improve detection and response while raising security analyst productivity. Since its founding in 2016, Respond Software has partnered with more than 100 customers to apply data science to help security operations defend their enterprise. www.respond-software.com.