Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

Author(s): Isaac Kinsella

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Info-Tech has developed an approach to analyzing and identifying the various attack tactics and techniques that are facing an enterprise. This approach is built on the foundations of the MITRE ATT&CK® framework. In tandem with the considerations from the Cloud Security Alliance, Info-Tech has created a threat preparedness workbook to highlight the threat vectors that are facing your enterprise.

  • Learn about potential attack vectors and the techniques that hostile actors will use to breach and maintain a presence on your network.
  • Analyze your current protocols versus the impact of an attack technique on your network.
  • Discover detection and mitigation actions.
  • Create a prioritized series of security considerations, with basic actionable remediation items. Plan your next threat model by knowing what you’re vulnerable to.

View the Complete Blueprint:

Threat Preparedness Using MITRE ATT&CK®

Keep track of threat tactics and techniques as they evolve.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019