December 3, 2018 | Content Aggregator - Single Slide | Threat Detection and Hunt Teaming
What's the best low- or no-cost way to get started with threat hunting? In this Ask-an-Expert written response, IANS Faculty Ken Van Wyk offers tips for uncovering the most common forms of system compromise and suggests places where tools and automation can help.
The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum walk through the framework’s components and how to put them to the best use when doing assessments in your organization.
Would UEBA add any value to a mature SOC with custom security analytics? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman says it's tough to beat mature processes and custom analytics, and that a better use of resources would be focusing on training and honing current processes.
Many organizations are using MITRE’s ATT&CK framework to assist in threat modeling, threat hunting, purple teaming and more. In this report, IANS Faculty Mike Pinch details the many ways to leverage the framework to increase your security program’s effectiveness.