MITRE ATT&CK for Ransomware Evasion

November 19, 2021

Watch Len Noe, CyberArk’s own white-hat and biohacker, in the virtual war room as he dissects one of this year’s most devastating and well-known ransomware attacks. With the MITRE ATT&CK framework as his guide, he’ll map the adversary’s tactics, techniques, and procedures (TTPs) to each point of the cyber kill chain and examine exactly how the attack was carried out from reconnaissance through to exfiltration.

Through demonstrations of the counter-threat methods and tools used to mitigate and prevent attack progression, you’ll see a practical example of how to leverage the MITRE ATT&CK framework to help improve your company’s security posture, contain threats, and mitigate risk.

Attendees of this guided experience will walk away with

  • An understanding of the MITRE ATT&CK framework and its applications to improving an organizations security posture
  • Common TTPs used by today’s cyber criminals and vulnerabilities to be aware of
  • The right mitigation strategies and controls to prevent similar attacks
Previous Video
Defense-in-Depth Across Desktop Virtualization Endpoints
Defense-in-Depth Across Desktop Virtualization Endpoints

Learn how CyberArk and Amazon Web Services (AWS) can effectively extend strong privilege access controls to...

Next Article
What a 100-Year Plant Disease Reveals About Endpoint Privilege Security
What a 100-Year Plant Disease Reveals About Endpoint Privilege Security

At the turn of the 20th century, a little-known plant disease called white pine blister rust emerged in the...

Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

Download Now