0% found this document useful (0 votes)
113 views1 page

Lessons Applying-MITRE-ATT&CK-in-the-Wild

This document discusses a panel session at the RSA Conference on lessons learned from applying the MITRE ATT&CK framework for adversarial tactics and techniques. The panel included representatives from Microsoft, Pfizer, and Target discussing their experiences using ATT&CK in operational settings to improve cybersecurity analytics, threat intelligence, and defenses.

Uploaded by

ivans2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views1 page

Lessons Applying-MITRE-ATT&CK-in-the-Wild

This document discusses a panel session at the RSA Conference on lessons learned from applying the MITRE ATT&CK framework for adversarial tactics and techniques. The panel included representatives from Microsoft, Pfizer, and Target discussing their experiences using ATT&CK in operational settings to improve cybersecurity analytics, threat intelligence, and defenses.

Uploaded by

ivans2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

SESSION ID: STR-R11

Lessons from Applying MITRE ATT&CK in the Wild

MODERATOR: Richard Struse


Chief Strategist, Cyber Threat Intelligence – The MITRE Corporation

PANELISTS: Jessica Payne Rachael Schweizer David Westgard


Security Person Cybersecurity Analytics Lead Lead Engineer, Cybersecurity
Microsoft Pfizer Target
@jepayneMSFT @DaveWestgard
#RSAC

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy