Now available to watch on-demand
Feeling overwhelmed by MITRE ATT&CK and behavior-based detection? You’re not alone. Behavioral analysis has often been viewed as an advanced undertaking for cybersecurity’s elite. Adding to its complexity is the unnecessary pursuit of “full” MITRE ATT&CK coverage, which has been pushed by solution providers and the security industry as a whole.
Chris Gerritz of Infocyte and Dan Wiley of Check Point will walk through the most common and important adversary behaviors you should have visibility on and how to handle them.
- What is Behavior-based Detection?
- How can you make it accessible for IT generalists and security teams?
- Is focusing on the top 20 most common behaviors and techniques enough?
- Real examples of incidents that showcase these top 20 behaviors.
Chief Security Officer and Head of Threat Management
Co-founder and VP of Threat Intelligence & Response