Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
This is the second instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® – Compromising the perimeter”.
"*" indicates required fields
Now we will look at the next five stages (4 to 8) and see how an attacker explores the network, discovering and compromising other systems and accounts.
We’ll walk you through a scenario demonstrating the attack stages, and show you the MITRE ATT&CK framework in action.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.