Speaker: Paul DiOrio, Lee Lawson, and Patrick Donegan
Recorded: May 20, 2020
Duration: 60 Mins
Watch this on-demand presentation to learn:
- The detection categories the MITRE evaluation uses – and what an endpoint product needs to do
- How our cloud-native Secureworks® Taegis™ XDR, previously Red Cloak™ Threat Detection and Response, application delivered accurate, early detections of attacks
- How to use MITRE ATT&CK evaluation results to inform your security decisions
The MITRE ATT&CK Framework is a common industry language of threat actor tactics and techniques based on real-world observations. MITRE regularly conducts product evaluations to provide independent transparency on the capabilities of security products to defend against known cyber adversary attacks.
This webcast explains how MITRE evaluations use their ATT&CK Framework to simulate attack scenarios that security vendors must then detect as quickly as possible. You’ll also hear about our results and perspective as a recent participant. Security teams can leverage the results of these evaluations to assess the array of vendor options against a common standard, think about key visibility points within their environment, and review their own detection coverage and security strategies.