Cyber Security Predictions for 2026
Following on from the introductory “MITRE ATT&CK® – An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.
Following on from the introductory “MITRE ATT&CK® – An Attacker’s Playbook”, we will now look at how MITRE ATT&CK® can be used to improve security monitoring and activities to prevent a compromise occurring.
We will see how an attack can be mapped to the Techniques and Tactics within the MITRE ATT&CK® Framework; and how this then leads to improvements in detection and mitigation processes.
# Attack Stage 1: Initial Access – an example of initial entry and two of the techniques used.
# Attack Stage 2: Execution – once initial access has been achieved, a look at how an attack will start to broaden, via the Execution Tactic.
# Attack Stage 3: Persistence – two Techniques that are used to establish connectivity for ongoing access to a Command & Control server.
# Detect & Defend – Mitigations that MITRE ATT&CK® provides, for the individual Techniques used in the stages of our attack scenario.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.