The MITRE ATT&CK framework is a powerful tool that provides a language to define, track, and categorize attacker tactics, techniques, and procedures (TTPs). But what if you could use it to gain a deeper understanding of how, why, and when attackers may abuse a technique? By combining threat actor intelligence with the ATT&CK 'dictionary,' you can add critical context to your detections to increase the effectiveness of your security controls tests and the fidelity of your results.
In this webcast, Matt Bromiley, SANS digital Forensics and Incident Response (DFIR) instructor, describes how you can make the most of ATT&CK and develop a process to read, interpret, contextualize, and test within your environment.
Attendees will learn to:
Register today and be among the first to receive the associated whitepaper written by Matt Bromiley.