MITRE ATT&CK Evals Explained

The MITRE ATT&CK evaluations test security vendors’ ability to quickly detect and stop tactics and techniques used by today’s threat actors. The Cybereason team has participated in all MITRE ATT&CK evaluations and is dedicated to helping organizations defend against real-world adversaries.

In this session, we're going to boil down the complexity of the MITRE ATT&CK framework so your organization can understand:

  • How to interpret the results across Protection, Detection and Linux.
  • The difference between Technique, Tactic, and Telemetry detections.
  • Why organizations are mapping to the MITRE ATT&CK framework and what’s next.

About the Author

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 34 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.