HOW TO BUILD EFFECTIVE ATTACK SCENARIOS

LEVERAGING THE MITRE ATT&CK MATRIX? 

February 28th, 2018 | 10:00 AM PST 

How to build effective attack scenarios leveraging the MITRE ATT&CK Matrix?

Date: February 28th, 2018
Time: 10:00 AM PST
Duration: 1HR 

 Most commercial and enterprise security programs are vulnerable to attackers who have access to a greater variety of techniques and penetration capabilities than the programs can detect.

MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target.

 In this webinar, you will learn about the latest attack scenarios developed by AttackIQ based on the MITRE ATT&CK Matrix:

  • Execute DLL Through RegSvr32 | MITRE TechID: T1117
  •  System Network Connections Discovery | MITRE TechID: T1049
  •  System Network Configuration Discovery | MITRE TechID: T1016
  •  New Service | MITRE TechID: T1050
  • Process Discovery | MITRE TechID: T1057

Can't attend, no worries, register now and we'll send you the recordings after the event.  

 Special Guest: 

Frank_Duff.jpg

Frank Duff | Principal Cyber Operations Engineer | MITRE     

Frank Duff is a principal cyber operations engineer at MITRE. His work has focused in endpoint security and cyber deception. He is the current principle investigator of the Leveraging External Transformational Solutions research and development effort that seeks to assist the integration of innovative commercial cybersecurity solutions into our sponsor base. 


What security experts are saying:

"AttackIQ and the MITRE ATT&CK framework provides us with a unique insight into our security controls and maturity."

- Stuart McIntosh, Security Analyst, Fortune 500 Financial Services Provider. 


"Commercial and Federal government entities alike can gain significant insight into organizational security postures, products and processes by assessing themselves against the known threat. Describing this threat via the ATT&CK Matrix enables a common way of communicating their organization's security, as well as identifying potential weaknesses to enable improvement."

-Frank Duff, lead for MITRE's Leveraging External Transformational Solutions in Cybersecurity at the MITRE Corporation.

SAVE ME A SPOT!