The Best Defense is ATT&CK: Applying MITRE ATT&CK to Your Organization

Cyber Security Master Class: Episode 12

MITRE ATT&CK has become the language defenders use when analyzing adversaries. MITRE’s database of tactics and techniques enables multiple teams, including red-teams, pen testers, threat hunters, and developers, to improve their security defenses. They can share information and then analyze and emulate different adversarial actions.

In this webinar, we will explore the MITRE ATT&CK framework. We will analyze multiple use cases and also unveil its biases and limitations. In addition, we will dive into how MITRE ATT&CK can be used within your SASE solution and see how this will enhance your organization’s security posture.

Join Bill Carter, System Engineer at Cato Networks, Ross Weisman, Innovation Lead at MITRE Center for Threat Informed Defense, and Etay Maor, Sr. Director of Security Strategy at Cato Networks, to learn:

  • How to operationalize the MITRE ATT&CK framework
  • What are the MITRE ATT&CK framework’s biases and limitations
  • Where and when you should use MITRE ATT&CK in your SASE solution
  • What is MITRE’s Center for Threat Informed Defense, and what are some of its cutting-edge projects

Save your spot for this special webinar.

Presented by

img

Bill Carter

System Engineer

Cato Networks

 

img

Ross Weisman

Innovation Lead

MITRE Center for Threat-Informed Defense

 

 

& Etay Maor

Sr. Director of Security Strategy

Cato Networks