it-sa365-n-Splunk-Header-Desktop

Best Practice Sharing: Cleverly using the MITRE ATT&CK Framework as a basis for attack detection under CRITIS

Presentation splunk for BITKOM e.V.

Topic

SIEM / Threat Analytics / SOC

When & Where

calendar_month

Wed, 05/03/2023, 15:45 - 16:15

Download session as iCaldownload_for_offline

Details

  • Format:

    it-sa insights

Session description

By 1 May 2023, every operator of critical infrastructures must for the first time have provided proof that systems for attack detection in accordance with § 8 a paragraph 1a are in use. Attack detection systems must continuously and automatically record and evaluate suitable parameters and characteristics from ongoing operations - your company must be able to continuously identify threats and initiate countermeasures if necessary.

Attend the lecture to learn how the MITRE ATT&CK framework can be used as a planning basis for identifying parameters and features to be monitored, what should be considered during planning and which five stumbling blocks should be avoided.

Moderator