Implementing an Email Security Strategy Using the MITRE ATT&CK Framework

Webinar Registration

Phishing attacks have long been the most prevalent and easiest means by which attackers gain entry into a victim organization’s network. Whether its ransomware, business email compromise, data theft, or espionage, email remains a primary attack vector today. While the bad guys work tirelessly to be creative and continually come up with new social engineering scams, it is possible to map their efforts back to the MITRE ATT&CK Framework.

While most use the MITRE ATT&CK Framework to paint a picture of techniques used to attack and infiltrate a network’s endpoints, servers, directory services, and other resources, it can also be used to plan your defense against tactics used by the bad guys.

So, how can you use the MITRE ATT&CK Framework to build an email security strategy?

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat as host, using MITRE to outline attacks and mitigations. 

Topics will include:

  • Mapping phishing and spear-phishing attacks to MITRE tactics and techniques
  • How email attacks can be used as a medium for every kind of cyberthreat today
  • What MITRE says about mitigating email-based attacks to create a robust email security strategy

Nick will be joined by Eric Chaves, Director of Solutions Engineering at GreatHorn, who will discuss a number of recent email attacks experienced by GreatHorn customers, diving into specific tactics used, including:

  • User, Company, and Domain Impersonation
  • Use of Malicious Links
  • Credential Compromise
  • Voicemail/Fax and Business Service Impersonation

Eric will also provide detail into recommended compensating controls that can be used to mitigate future attacks.

This real training for free event will be jam packed with technical detail and real-world application.  Register today!

First Name:   
Last Name:   
Work Email:  
Job Title:  
Company Size:

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Upcoming Webinars
    Additional Resources