Threat-Informed Defense for the Financial Sector
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
July 28, 2022
The Cloud Analytics project sought to advance the state of the practice by developing a blueprint for writing analytics for cloud platforms. To create the blueprint, the team “learned by doing” – exercising adversary behaviors, developing analytics, and refining them. Lessons learned were gathered along the way and incorporated into the analytics blueprint shared with the community.
Defenders achieve sufficient visibility of adversary behaviors in on-premises environments, but they struggle to achieve comparable visibility in cloud environments.
Developed a foundational set of cloud analytics for key TTPs and captured best practices and lessons learned in an analytics blueprint document.
Improves defenders’ ability to develop analytics to detect adversary behaviors in cloud environments.
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …
Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.