Putting it all Together into Threat-Informed Defense
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
>> Welcome to the fifth and final lesson of Module 3.
00:00
Putting it all together and to threaten form defense.
00:00
In this lesson, we will highlight and
00:00
appreciate how attack helps
00:00
us make better cybersecurity decisions.
00:00
As we previously discussed, cybersecurity is hard,
00:00
but it can be a lot easier when we coordinate,
00:00
communicate, and work together towards a common goal.
00:00
One of the central themes of
00:00
this module has been not to forget why we do this,
00:00
particularly every action and decision we make,
00:00
use to reflect back to how it's going to improve
00:00
our ability to defend against
00:00
our threats and their behaviors.
00:00
As we've shown, ATT&CK gives us
00:00
a quantifiable way of understanding,
00:00
tracking, communicating,
00:00
and addressing what our threats are doing.
00:00
We can use this knowledge to gain
00:00
strategic and operational advantages by
00:00
identifying and understanding what adversaries are
00:00
doing and working towards defending it as a community.
00:00
With that, we restart knowledge check for Lesson 5.
00:00
Threatened form defense involves.
00:00
Please pause the video and take a second
00:00
to select the correct answer before proceeding.
00:00
In this case, the correct answer was
00:00
e. Threaten from defense involves the people,
00:00
processes in any other action or decision.
00:00
It truly is a team effort.
00:00
With that, we've reached the end of Lesson 5.
00:00
In summary, ATT&CK,
00:00
specifically through our understanding of
00:00
threats and their behaviors,
00:00
can help us make and communicate threat-informed,
00:00
and better decisions across
00:00
all aspects of cybersecurity operations.
00:00
With that, we've reached the end of Module 3.
00:00
In summary, we explore the various ways of
00:00
operationalizing the knowledge capture with an ATT&CK and
00:00
how this accumulates into the idea of
00:00
threaten from defense or applying
00:00
an understanding of our adversary tradecraft
00:00
and their behaviors to prevent,
00:00
detect, and respond to cyber attacks.
00:00
For more great information,
00:00
definitely check out our ATT&CK eBook,
00:00
as well as don't forget to check out the rest of
00:00
the MITRE ATT&CK Defender learning courses.
Up Next
Similar Content