Advertisement

MITRE - Why It Matters

Advanced Technology Consulting (ATC)
Mar. 23, 2023
Advertisement

More Related Content

More from Advanced Technology Consulting (ATC)(20)

Advertisement

MITRE - Why It Matters

  1. Bill Carter Cybersecurity Engineer MITRE – Why It Matters Cato Networks. The Global SASE Leader.
  2. Bona Fides | 2
  3. What Is MITRE? 3
  4. History of MITRE • Founded in 1958 as Not-For-Profit • Technical Guidance for US Air Force • 1959 – FAA and Air Traffic Control • 1962 – Data Acquisition, Data Processing, System Sciences, Computer Programming • 1971 – Joins ARPANET • 1985 – First Ever .org Domain • 1995 – Y2K Conversion Key Consultant • 1999 – CVE System Created • 2003 – Expansion into Cybersecurity • 2013 – ATT&CK Knowledge Base Developed | 4
  5. What Is ATT&CK? 5
  6. What Is ATT&CK? | 6
  7. What We Usually Think | 7
  8. TTPs | 8
  9. Flexible Management • Self-service • Co-managed • Fully managed 9 NG Firewall Secure Web Gateway Advanced Threat Prevention Cloud and Mobile Security Cloud Optimization WAN Optimization Global Route Optimization Self-healing Architecture Branch Datacenter IPSec Internet MPLS Hybrid/Multi Cloud Agentless Mobile Client/Clientless SDP PoP Converged Network & Security TTPs | 9
  10. Pyramid of Pain David Bianco, SANS Institute | 11
  11. Cyber Threat Intelligence 12
  12. Who’s Who | 13
  13. Playbook | 14
  14. Adversary Emulation 15
  15. A Proactive Approach | 16
  16. Flexible Management • Self-service • Co-managed • Fully managed 17 NG Firewall Secure Web Gateway Advanced Threat Prevention Cloud and Mobile Security Cloud Optimization WAN Optimization Global Route Optimization Self-healing Architecture Branch Datacenter IPSec Internet MPLS Hybrid/Multi Cloud Agentless Mobile Client/Clientless SDP PoP Converged Network & Security Adversary Behaviors | 17
  17. Attack Flow | 18
  18. Flexible Management • Self-service • Co-managed • Fully managed 19 NG Firewall Secure Web Gateway Advanced Threat Prevention Cloud and Mobile Security Cloud Optimization WAN Optimization Global Route Optimization Self-healing Architecture Branch Datacenter IPSec Internet MPLS Hybrid/Multi Cloud Agentless Mobile Client/Clientless SDP PoP Converged Network & Security “Recipe Card” | 19
  19. | 20
  20. Purple Teaming 21
  21. Red vs. Blue | 22
  22. Purple Team Methodology | 23
  23. Threat Detection 24
  24. What To Watch | 25
  25. SOC Assessment 26
  26. Heatmap | 27
  27. Moving Forward 28
  28. Resources • https://attack.mitre.org • https://mitre-attack.github.io/attack-navigator/ • https://app.cybrary.it/my-learning • https://mad.mitre-engenuity.org/ | 29
  29. Cato SASE. Ready for Whatever’s Next. Thank You! 30

Editor's Notes

  1. Real World Behaviors
Advertisement