Aligning Security Solutions with MITRE ATT&CK

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

OTHER ON-DEMAND WEBINARS

Practical Advice for Complying with Federal Cybersecurity Directives

Join an open source security leader and a former DoD DevSecOps engineer for actionable tips on successfully aligning your leadership, culture, and process to comply with federal cybersecurity directives.
Watch Now

Stage 4 – Response: The fourth layer of your cyber-defence-in-depth strategy

Implementing a cyber security incident response management plan means you won’t waste valuable time when the worst happens. Cyber incident response is a part of wider business continuity management. It helps you put plans in place to cover all types of unplanned disruption, from cyber security incidents to natural disasters, from power outages to pandemics.
Watch Now

Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation: A Roadmap

Our cybersecurity experts Sharath Acharya and Prayukth K V as they discuss the roadmap to Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation. This On-Demand webinar will offer critical insights for evolving an enterprise-wide strategy to ensure adequate IT and OT security integration and closure of postural gaps and security deficiencies.
Watch Now

Stage 3 – Management: The third layer of your cyber-defense-in-depth strategy

When it comes to larger or more complex organizations, managing cyber security risks requires a more intensive approach than implementing basic security protection. Embedding risk-based security controls, managing the security of supply chains, and carrying out regular audits are some of the many measures an organization may need to take to manage and reduce risk.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

resources