MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 3

  • @kokhoongkan7623
    @kokhoongkan7623 4 года назад

    Synopsis
    3:00 Initial problems
    4:30 First attempt
    5:00 Wrong story
    6:25 Correct story (explains to management why is ATT&CK useful)
    11:46 I know 'Who', but not 'What'
    12:20 ATT&CK gives the 'What', but not it is not complete. You need other sources.
    12:37 Heat map
    15:00 Knowing is half the battle won
    15:15 5-step process
    18:00 Outcome
    20:00 Top 10 techniques

  • @eyeseeyou3322
    @eyeseeyou3322 4 года назад

    Well spoken! 👍👍

  • @ArandomNutter
    @ArandomNutter 2 года назад

    Question, how do I find information on threat actors?