Security

Where Should CISOs Start with MITRE? Steve Winterfeld’s Practical Entry Point | Akamai | TFiR

0

The Core Concept: MITRE’s framework library is extensive enough to overwhelm any security team trying to get started — Steve Winterfeld cuts through it with three specific capabilities that give defenders an immediate, practical understanding of the threat landscape: the ATT&CK framework, criminal group profiles, and the ATT&CK Navigator.

The Guest: Steve Winterfeld, Advisory CISO at Akamai

The Bottom Line:
• For most defenders, the fastest path to value from MITRE starts with three things: understanding the ATT&CK framework, learning how criminal groups are profiled within it, and using the Navigator to visualize how those TTPs map to your existing controls — everything else branches from there based on your industry and role

Read Full Transcript & Technical Deep Dive

LocalStack Adds App Inspector to Simplify Debugging in Cloud-Native Development

Previous article

The AI Network Wall: Why You’re Wasting Billions on Idle GPUs | Drew Perkins & Omar Hassen, Eridu | TFiR

Next article