Time
12:05 PM - 12:35 PM (PDT)
Name
Building Threat-Informed Defense Operations into Continuous Monitoring to Mature a Security Program
Track
Networking
Description

Government agencies implement continuous monitoring as part of their regulatory compliance initiatives. Following guidelines such as NIST 800-37 to perform these activities, continuous monitoring helps organizations to gain “visibility into organizational assets, awareness of threats and vulnerabilities, and visibility into the effectiveness of deployed security controls.” According to MITRE, "Threat-informed defense applies a deep understanding of adversary tradecraft and technology to protect against, detect, and mitigate cyber-attacks.” This presentation discusses cyber threat-informed defense activities and how these can be incorporated into the continuous security monitoring process to protect corporate assets from advanced attacks and insider threats proactively.