“MITRE ATT&CK for Dummies” Notes

“MITRE ATT&CK for Dummies”

Introduction

Resources

Understanding MITRE ATT&CK and Cybersecurity

TTPs

  • Tactics: adversary’s technical goals
  • Techniques: how goals are achieved
  • Procedures: specific implementations of techniques

Using Threat Intelligence and Threat-Informed Defense

Ways to benefit from threat intelligence and MITRE ATT&CK

  • Identify key hostile actors using a globally vetted framework
  • Gain insight into adversaries’ operational behavior to analyze how that impacts your defenses
  • Deepen your approach by comparing your results to other analysts’
  • Strengthen your defense teams by focusing on countering known hostile actors.

Developing Assessments and Engineering

Looking at a Use Case: Leveraging MITRE ATT&CK in the Financial Sector

Ten Ways to Apply the MITRE ATT&CK Framework

  • Cyberthreat Intelligence
  • Automated Testing and Auditing
  • Security Risk Management and Strategy
  • Regulatory and Compliance Mapping
  • Security Control Rationalization
  • Analyst Training and Exercises
  • Threat Hunting
  • Commercial Security Solutions Evaluations
  • Security Pipeline Validation
  • Business Enablement

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.