Containerization & Sandboxing , Endpoint Detection & Response (EDR) , Endpoint Security
Mapping Your Network Security Controls to MITRE ATT&CK
MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) has served as a model through which interested parties can learn to identify and map digital intrusions against their existing security technologies allowing them to shore up their gaps and prevent more intrusions on endpoints.
But what about the network? Given this incredible resource, can one map network security controls like Intrusion Prevention Systems, Network Sandbox and Network Traffic Analysis against MITRE ATT&CK? Can these mappings be inclusive/exclusive of each other?
Register for this webinar which will discuss:
- Benefits of mapping your network security controls to MITRE ATT&CK
- Differences in coverage between IPS, Network Sandbox, and NTA on MITRE ATT&CK techniques
- How a Network Detection and Response (NDR) platform can better illuminate the network techniques across all tactics employed by malicious actors
- Mapping these adversarial movements across these various tactics and techniques and NDR's capability to detect and respond to these threats