Applying the MITRE ATT&CK Framework to Detect Insider Threats

Presented by

Augusto Barros, VP of Solutions at Securonix

About this talk

The MITRE ATT&CK framework has become an excellent way for security professionals to understand and describe threats. However, most of the time, it is used to describe the actions of external threats. But what about the insider threats? According to Forrester, 25% of breaches resulted from internal incidents, and almost half of them were malicious. In the past few years, insider threats have evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications and the current remote work setup make tracking and protecting sensitive data extremely challenging. Can we use the MITRE ATT&CK framework to help us describe, understand, and finally detect and protect against insider threats? If the framework often describes and supports threat detection of external threats, does it also help deal with insider threats? What organizations should expect from this exercise, and what do they need to do differently to achieve the desired results? Join Augusto Barros, VP of Solutions at Securonix, to learn about: • How insider threats have evolved and the new challenges they present? • How the MITRE ATT&CK framework supports threat detection practices? • How the MITRE ATT&CK framework can also help to address the issues related to insider threats? Augusto Barros was the Research VP in the Gartner for Technical Professionals (GTP) Security and Risk Management group. He has over 20 years of experience in the IT security industry as an analyst and a security architect and officer for large enterprises.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (784)
Subscribers (198114)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.