Security leaders who are new to the MITRE ATT&CK Framework will learn how to make better use of the framework to identify security weak spots — and where to prioritize budget and project planning, from IR and threat intelligence to SOC operations. Cybersecurity analysts already know how ATT&CK can help identify adversaries by mapping TTPs and behaviors across the framework. In this application, ATT&CK has become a daily tool for hunters and analysts to better connect and anticipate multi-stage or nation-state attacks. But the MITRE ATT&CK framework can also be used to assess your level of strategic coverage and prioritize how you build out your cyber organization.
![7d93a656-6d2e-4e04-91c4-b12a1ead1433](https://www.ironnet.com/hs-fs/hubfs/7d93a656-6d2e-4e04-91c4-b12a1ead1433.jpg?width=488&name=7d93a656-6d2e-4e04-91c4-b12a1ead1433.jpg)
Speakers:
- Adam Pennington, ATT&CK Lead
- Bill Swearingen, IronNet Cyberstrategist & former CISO