Sponsor Track

Identifying and Defending the Perimeter With Attack Surface Management

Virtual October 21, 2020 10:40 am - 11:10 am Feedback     

Bookmark and Share

Geoffrey Roote

The need to operate online has driven businesses toward a digital transformation with cloud adoption at its core. The pace of this transformation sped up drastically as COVID-19 dispersed entire workforces and business operations around the world. In a matter of days, operating a business with an entirely “at home” workforce became the norm. And with it came the challenges of securing the perimeter and beyond.

With these challenges in mind, organizations are turning to defensive frameworks to help Blue Teams implement threat mitigations. MITRE ATT&CK strives to map TTP’s to many vectors, while the Lockheed Martin Cyber Kill ChainÒ helps contextualize where those vectors exist within the perimeter. RiskIQ can identify assets that align to those TTPs, helping teams prioritize their efforts to defend their attack surface.

In this talk, RiskIQ will highlight the ways organizations can identify at-risk infrastructure, map it back to the MITRE framework and mitigate risks before they’re exposed. Attendees will walk away with use-case information on framework/Kill Chain adoption. They’ll understand how to get started, including adoption metrics, supportive tools and common challenges. We’ll offer actionable recommendations for those whose organizations are considering or have just started this process during the COVID-19 crisis.


  • Gain a real-world understanding of how to implement the MITRE ATT&CK framework and LM Cyber Kill Chain across an external footprint
  • Provide Blue Teams with a view into defending their digital footprint using an “outside-in” mentality