
Best Practice Sharing: Cleverly using the MITRE ATT&CK Framework as a basis for attack detection under CRITIS
Since 1 May 2023, every operator of critical infrastructures must have provided proof that systems for attack detection in accordance with § 8 a paragraph 1a are in use.
Topic
SIEM / Threat Analytics / SOC
When & Where
Details
Format:
Technology lecture
Session description
Attack detection systems must continuously and automatically record and evaluate suitable parameters and characteristics from ongoing operations - your company must be able to continuously identify threats and initiate countermeasures if necessary.
Attend the lecture to learn how the MITRE ATT&CK framework can be used as a planning basis for identifying parameters and features to be monitored, what should be considered during planning and which five stumbling blocks should be avoided.
Attend the lecture to learn how the MITRE ATT&CK framework can be used as a planning basis for identifying parameters and features to be monitored, what should be considered during planning and which five stumbling blocks should be avoided.