Lessons from Applying MITRE ATT&CK in the Wild
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Introduction
Take stock
Detection Focus
High Fidelity Alerts
Uncontrolled Environment
Big Data
Detections vs Alerts
Detects vs Alerts
What will drive Intel
Partnership with MITRE
How to use ATTCK
Jerry Springer moment
Dont treat it as a sacred document
Break PowerShell up
Roadmap
ATTCK as a Communications Tool
How are you instrumented for MITRE
Do you have anything to add
How are you integrating
What should vendors be doing
Dark Block June
Advice for Vendors
Manual vs Automated
Using Attack as a Resource
Admitting Your First Step
Transparency
Testdriven development
Enel test
Creating regression
Testing analytics
Using attribution
Attribution
Impact
Measuring Impact
Educational Tool
Following the right people
Free tools
Analytics
Taught by
RSA Conference
Related Courses
Ethical Hacking: Introduction to Ethical HackingLinkedIn Learning Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight Intro to Purple Team - Cyber Threat Intelligence, Attack, Detect, Respond
RSA Conference via YouTube Generating MITRE ATT&CK DNA for Groups of Actors
Cooper via YouTube Atomic Threat Coverage - Being Threat Centric
BruCON Security Conference via YouTube