This resource is no longer available

Cover Image

In order to properly defend against hackers, it’s imperative for you to be aware of the specific TTPs used at each phase of an attack and maintain a strong defense. Frameworks such as MITRE ATT&CK have aided organizations in extending their previous kill-chain models to be more focused on the TTPs that attackers are using every day.

Examples of the tools and techniques used in each phase of the kill-chain are:

  • Attacker preparations and anonymity
  • Enumeration and Scanning
  • Gaining credentialed access to applications and accounts
  • Exploitation and detection evasion
  • Abuse of APIs
  • Pivoting to do damage after an exploit

Watch this webinar to gain a better understanding of the key TTPs at the heart of modern application attacks and tips for ensuring continuous defenses across the lifecycle of an attack.

Vendor:
ThreatX
Premiered:
Aug 4, 2021
Format:
Multimedia
Type:
Webcast

This resource is no longer available.