Community Perspective

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
welcome to model to
00:02
this module is split into four lessons which will explore the various benefits of using attack.
00:08
Specifically,
00:10
we will discuss the diversity of information captured with an attack, and Alice enables us in a broad spectrum of cybersecurity practices and operations.
00:19
We also explore how attack can be used to quantify various cyber security metrics and how the common language created by attack can help us efficiently communicate about Syria behaviors.
00:29
Without further ado, let's dive in
00:32
welcome to module to less than one
00:34
community perspective.
00:38
In this lesson, we will explore the various sources of information that build, attack and appreciate how attack benefits from this diversity of knowledge and perspectives.
00:51
As you recall from Aldo, one attack is built from publicly available reporting and documentation, as well as insights, feedback and contributions from the global community.
01:00
And while the miter attack team does curate and maintain this collective knowledge,
01:03
this dependence on publicly available reporting and contributions makes attack very much a team effort.
01:12
To highlight this, let's take a look at some content with an attack.
01:17
In this case, we're looking at the Target Group page
01:19
and the short description provided by the attack team.
01:23
While this description was drafted and authored and published by the tech team,
01:27
it is based on publicly available reporting that yourself can go check out.
01:37
There's also extends to various other objects with an attack. Most importantly, procedures.
01:42
In this case, we can see the various techniques and some techniques
01:47
map to the terror group or all referenced back to publicly available in reporting
01:52
that we can dive into for more details.
01:57
Attack very much depends on and appreciates all of the contributors.
02:05
You can go to individual pages and check out the contributors, but we also have a full listing on our contributors page.
02:13
As you can see,
02:14
this list contains a lot of key industry thought leaders and organizations
02:17
which really build
02:19
the full power and perspective of attack.
02:25
This diverse perspective results in a breath of ideas and operational applications. As we see the adversary, behaviors capture an attack span a wide range
02:35
of domains and ideas,
02:39
and with that, we acknowledge check for less than one
02:43
true or false.
02:44
Miter collects proprietary, classified or otherwise sensitive data to use his references with an attack.
02:51
Please positive video.
02:52
Take a moment to think about the correct answer before proceeding.
03:00
In this case, the answer is false.
03:02
As we said before, Minor uses publicly available cyber threat intelligence that anyone can access as the references for attack.
03:13
And with that, we've reached the end of less than one
03:15
in summary attack is built from publicly available cyber threat intelligence as well as insights and sizeable contributions from the global community,
03:23
and this result in a great benefit for attack as we capture a wide
03:28
perspective of technology and operational use cases.
Up Next