April 29, 2022, 6:12 p.m. | /u/GutInstinctScience

cybersecurity www.reddit.com

I've learned a lot about MITRE ATT&CK recently, but one thing I have trouble answering definitively is the chain of events that ATT&CK threat modeling is supposed to fit into. A few folks in my org have some... interesting ideas about how to use ATT&CK, and it really feels like we're missing the mark. Currently, we've got architects mapping individual techniques (or sub techniques) and ending up with an output that looks *kind of* like an attack tree or adversary …

amp att ck cybersecurity events mitre mitre att&amp order threat threat models

Technical Senior Manager, SecOps | Remote US

@ Coalfire | United States

Global Cybersecurity Governance Analyst

@ UL Solutions | United States

Security Engineer II, AWS Offensive Security

@ Amazon.com | US, WA, Virtual Location - Washington

Senior Cyber Threat Intelligence Analyst

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Embedded Global Intelligence and Threat Monitoring Analyst

@ Sibylline Ltd | Austin, Texas, United States

Senior Security Engineer

@ Curai Health | Remote