- Видео 3
- Просмотров 18 896
Raiders of the Lost ARP
США
Добавлен 25 окт 2011
There is a big difference between seeing the big cyber events and trends happening around us, and taking control of the situation to reduce their impact. This channel will aim to make sense of those events and show how we can reduce the noise to focus on our own threat picture and improve defenses.
Using MITRE's ATT&CK Navigator for Gap Analysis
Cyber Threat Intelligence isn't just for the big companies! MITRE has built an open and expansive resource for all of us, and now we too can begin to leverage threat intelligence to improve our defenses and structure our operations. The Adversarial Tactics, Techniques, and Common Knowledge database (ATT&CK) helps us see not only the behaviors we can expect from the bad actors, but how we might mitigate the risk or detect their actions.
In this primer, we take a few minutes to get oriented and then set about evaluating some threat actors and their behaviors. After building that consolidated threat picture, we see how simple it is to compare that against defenses we have provisioned to help ...
In this primer, we take a few minutes to get oriented and then set about evaluating some threat actors and their behaviors. After building that consolidated threat picture, we see how simple it is to compare that against defenses we have provisioned to help ...
Просмотров: 9 481
Видео
Using MITRE Caldera to Emulate Threats in Your Environment
Просмотров 9 тыс.2 года назад
Red Team assessments and penetration tests are essential efforts to helping improve your defenses, but what if you wish to try this yourself? Caldera offers you a rich, automated, and open-source platform by which to test defenses and truly test how you are doing. It is also extremely helpful in learning how threat actors might approach your environment, and is a great instructional tool! DISCL...
Missing Pieces Security Webinar - Supply Chain Security (Ep.1 January 2022)
Просмотров 692 года назад
Much of what we’ll be leveraging comes from CISA and NIST: • Background: o Report to White House on Reducing SW Vulns: csrc.nist.gov/publications/detail/nistir/8151/final o Supply Chain Security memo from April 2021 covers many aspects: www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf • Common Exploits: o Again, the top 3 are referred in th...