MITRE ATT&CK has become the language defenders use when analyzing adversaries. MITRE’s database of tactics and techniques enables multiple teams, including red-teams, pen testers, threat hunters, and developers, to improve their security defenses. They can share information and then analyze and emulate different adversarial actions.
In this webinar, we will explore the MITRE ATT&CK framework. We will analyze multiple use cases and also unveil its biases and limitations. In addition, we will dive into how MITRE ATT&CK can be used within your SASE solution and see how this will enhance your organization’s security posture.
Join Bill Carter, System Engineer at Cato Networks, Ross Weisman, Innovation Lead at MITRE Center for Threat Informed Defense, and Etay Maor, Sr. Director of Security Strategy at Cato Networks, to learn:
How to operationalize the MITRE ATT&CK framework
What are the MITRE ATT&CK framework’s biases and limitations
Where and when you should use MITRE ATT&CK in your SASE solution
What is MITRE’s Center for Threat Informed Defense, and what are some of its cutting-edge projects
Save your spot for this special webinar.