Outside the (Sand)box: Operationalizing MITRE ATT&CK to Strengthen Your Defenses

Your sandbox just notified you that it has successfully blocked a malicious file. Now what?

While it may be tempting to conduct your own attack analysis to reverse engineer it, this simply isn't feasible while managing hundreds or thousands of daily alerts.

Instead, let’s skip to the good part—applying the sandbox report findings, such as the executable’s actions, to the MITRE ATT&CK framework to further strengthen your defenses.

Watch this webinar for a SOC point of view on:

  • Identifying, understanding, and protecting against hidden, unknown threats & techniques
  • Building sandbox findings into SecOps workflows
  • Operationalizing the MITRE ATT&CK framework based on an adversary’s tactics, techniques, and procedures

Speakers:

Erik Yunghans
Principal Product Manager
Zscaler

Amy Heng
Product Marketing Manager
Zscaler

Fill out the form to watch webinar