Header of Splunk

Best Practice Sharing: Cleverly using the MITRE ATT&CK Framework as a basis for attack detection under CRITIS

Since 1 May 2023, every operator of critical infrastructures must have provided proof that systems for attack detection in accordance with § 8 a paragraph 1a are in use.

Topic

SIEM / Threat Analytics / SOC

When & Where

calendar_month

Tue, 10/10/2023, 10:30 - 10:45

location_on

Forum, Booth 9-103

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

Attack detection systems must continuously and automatically record and evaluate suitable parameters and characteristics from ongoing operations - your company must be able to continuously identify threats and initiate countermeasures if necessary.

Attend the lecture to learn how the MITRE ATT&CK framework can be used as a planning basis for identifying parameters and features to be monitored, what should be considered during planning and which five stumbling blocks should be avoided.


Moderator