Topic: Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&CK
Abstract:In a constantly evolving threat landscape, understanding and prioritizing threats are critical to an organization’s cybersecurity strategy. This webinar, Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&CK, explores how to leverage the MITRE ATT&CK framework to create actionable heatmaps that identify and score the most relevant threats to your organization. By integrating threat intelligence, control effectiveness assessments, and real-world attack data, attendees will learn how to align their defensive strategies to emerging threats and improve their overall security posture.
Key Takeaways:
- Practical Application of MITRE ATT&CK: Learn how to create and interpret heatmaps that visualize and prioritize threats effectively.
- Control Effectiveness Scoring: Understand methods to score the effectiveness of logging, prevention, detection, and response measures against identified TTPs.
- Integrating Threat Intelligence: Discover how to enhance heatmaps with external and internal threat intelligence for comprehensive analysis.
- Identifying Gaps and Weaknesses: Gain insights into identifying zero-coverage areas while prioritizing controls for high-risk TTPs.
- Cross-Departmental Collaboration: Explore strategies for using heatmaps as a tool to foster collaboration across security teams and departments.
Speaker:
Mark Mackensen, Lead Threat Intelligence Analyst, Paylocity
Bio: Senior Cyber Threat Analyst at Paylocity, Mark Mackensen brings over a decade of cybersecurity expertise, with a specific focus on Cyber Threat Intelligence (CTI) and Threat Hunting. Currently leading Paylocity’s CTI and Threat Hunting programs, Mark has been pivotal in developing these initiatives from inception to operational maturity. This includes crafting tailored methodologies, frameworks, and protocols that enhance incident response capabilities and fortify overall security posture. Prior to Paylocity, Mark managed a global team of threat intelligence analysts at General Dynamics Information Technology for the Department of Defense. There, he focused on leveraging the MITRE ATT&CK framework, improving intelligence sharing, and guiding a team through comprehensive threat intelligence cycles—ultimately delivering actionable intelligence critical for security operations. Mark’s leadership extended to managing the West Coast threat intelligence team, emphasizing operational excellence and strategic mentorship.