Mapping threat intelligence to the MITRE ATT&CK Framework

Presented by

Simon Plant, Sr. Director of Product Management, Bromium, Alex Holland, Bromium Labs Malware Analyst

About this talk

Enhance your threat intelligence data with the MITRE ATT&CK Framework and application isolation. Using real-life threat samples, this technical webinar will discuss: - How threats can play out in MITRE’s command and control (C2) tactics using isolation for endpoint security - How you can use Bromium’s threat telemetry to map to the MITRE ATT&CK framework Be proactive with endpoint isolation. Learn how Bromium gathers detailed threat intelligence based on the MITRE ATT&CK framework to give your SOC team actionable information using standard industry definitions and language, to save them time and effort in responding to advanced threats.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (3)
Subscribers (654)
Bromium stops what your layered defenses miss and keeps your intellectual property secure. Bromium automatically isolates key attack vectors such as Word documents, phishing links and web downloads, adapts to new attacks using behavioral analysis, and instantly shares threat telemetry including the full kill chain analysis.