Mapping risk and understanding your threat coverage
In this webinar we’ll discuss how to identify & understand your relevant risk scenarios, their detection use cases and the data sources that allow you to monitor for and mitigate such risks.
Using a real world ransomware incident, perpetrated by TA505, aka EvilCorp, we’ll demonstrate how you can map this risk and the techniques, tactics and procedures of TA505, to your monitoring capability, ensuring you have coverage against such an attack. We call this Threat Coverage Modelling and it helps clients understand:
- The top threats relevant to their business
- The techniques used by specific threat actor groups
- If your current monitoring will protect you against these techniques