Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations.
Join us for this on-demand webcast as we discuss:
- An overview of the MITRE ATT&CK framework and how to use it, as well as recent updates
- Challenges with using MITRE ATT&CK for detection
- A proactive approach to threat hunting leveraging analytics
Speaker and Presenter Information
Relevant Government Agencies
DOD & Military, Other Federal Agencies, Federal Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Where
Free Webinar
Website
Click here to visit event website
Event Sponsors
Organizer
Exabeam Government Team at Carahsoft
Join the event conversation:
@exabeam