Blueprint: Build the Best in Cyber Defense cover image

Alexia Crumpton: MITRE ATT&CK for Defenders

Blueprint: Build the Best in Cyber Defense

00:00

Detection, Mitigation, Desection

So with an attack, we want to keep it to the 99 % who are not technical. So whether its techniques, tactics, mitigations an desections, they very journalized. We might give little blurbs of, this is the command line that you can use that you'll see. But it's a generalized statement of what your actions should be. Unlike password policies, or not opening spums, or clicking links,. Or am doing use your training and understanding that certain things am you can ant can't do withoa computer system having data back ups  and integrity checks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app