A CISO’s Reflections on RSA 2017
ATT&CK techniques detected
T1595Active Scanning
38%
“, still others are actually meant to find rogue network devices. none of the solutions i saw tied all of these together in an effective way. lastly, there was little explanation about the richness of these vendors ’ apis. the ability to integrate and provide clarity and automatio…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
33%
“they uncover a new threat at one customer, they can hunt everywhere rapidly to see who else might be impacted. there also seems to be confusion between threat intelligence and threat hunting, which is resulting in a conflation of these two related but distinct functions. talent s…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1592Gather Victim Host Information
31%
“, still others are actually meant to find rogue network devices. none of the solutions i saw tied all of these together in an effective way. lastly, there was little explanation about the richness of these vendors ’ apis. the ability to integrate and provide clarity and automatio…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Recapping RSA 2017: Endpoint Protection, Threat Hunting, and Talent Searching Abound!