ISMG’s Virtual Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Virtual Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal and online setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Operationalizing the MITRE ATT&CK Framework
Tom Field – SVP – Editorial, ISMG / Ben Smith – Field CTO with NetWitness, an RSA Company
Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.
Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to work and to discuss with your peers:
- How to use the framework for remediation planning;
- How threat intelligence, asset management and more complement the framework;
- Why and how operationalizing the framework requires more than technical objectives.
Join ISMG’s Tom Field for a moderated discussion that will feature insight from Ben Smith, Field CTO with NetWitness, an RSA company. This 90-minute session will be:
- Chatham house rules
- Peer driven
- Pitch free
Date: Wednesday, November 17th, 2021
Time: 4:00 – 5:30 PM ET
Moderator: Tom Field
About the Sponsor
NetWitness, an RSA business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats. For more information, go to netwitness.com.