Episode 40 — Map TTPs Using MITRE ATT&CK Within Adversary Analysis and Threat Frameworks

Standardized language is the foundation of modern threat analysis, and this episode focuses on mapping Tactics, Techniques, and Procedures (TTPs) using the MITRE ATT&CK framework. We define TTPs as the specific actions and operational habits that describe how an attacker achieves their goals, such as initial access or persistence. The discussion explains how the MITRE ATT&CK matrix organizes these behaviors into a searchable catalog for professional defenders. You will learn how mapping evidence to these techniques supports detection coverage and helps prioritize your response work. We practice a scenario where observing credential dumping leads to a specific technique and tactic mapping, providing the context needed to anticipate an intruder's next move. This technical overview provides the shared vocabulary needed to communicate threat intelligence with seasoned precision across the security industry. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 40 — Map TTPs Using MITRE ATT&CK Within Adversary Analysis and Threat Frameworks
Broadcast by