Five Steps to Improve Defenses with MITRE ATT&CK>
Cyber Reason Blog – Dan Verton
STEP 1. ESTABLISH INPUTS STEP 2. CREATE AN ADVERSARY EMULATION PLAN STEP 3. RUN AN ATTACK SIMULATION STEP 4. ALERT, HUNT AND REPORT STEP 5. PLAN FOR PROCESS & TECHNOLOGY IMPROVEMENTS
Link: https://www.cybereason.com/blog/five-steps-to-improve-defenses-with-mitre-attck
Five Steps to Improve Defenses with MITRE ATT&CK
Categories:
Tags: