<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

LIVE EVENT:
New York City (Lower Manhattan)

Understanding the MITRE ATT&CK Framework

Understand COmmon Threat Actors and Techniques_

 

WHEN: February 27th FROM 11:30 AM-1:00 PM

LOCATION: Manhatta RESTAURANT

The MITRE ATT&CK framework is a very effective tool for “adversary emulation”, cataloging how adversaries behave, what they’re trying to do, and the techniques used to accomplish their means. Moreover, the framework aims to provide a common language and vocabulary for practitioners, vendors, and all parties working to understand common threat actors and techniques.

In November 2018, MITRE evaluated a subset of techniques in an open-test environment, working with vendors to analyze their detection capabilities against these common techniques. With the results of this first evaluation now published, many are trying to make sense of results to understand the efficacy of different solutions in the marketplace today.

In this event, we’ll boil down the complexity of the MITRE ATT&CK framework so your organization can understand:

• How to adapt the framework to your company’s environment and needs in order to get the most utility out of it
• What different detection categories mean and how to interpret results of ATT&CK Framework evaluations
• How Cybereason allows customers to search and understand their environment based on the ATT&CK Framework

REGISTER NOW

Manhatta | 28 Liberty St 60th floor, New York, NY 10005