WELCOME

Defending against cyberattacks today requires security teams to work smarter, not harder. Cyber criminal strategies target every link, from gathering information, gaining access, moving laterally across the network, discovering resources to target and to evade detection while exfiltrating data.

Join us in the first of this 2-part webinar series to learn how security teams can use a combination of tools, strategy, automation to monitor the MITRE ATT&CK and automate as much of the process as possible.

Understanding MITRE ATT&CK flow:

  • Enables security teams to zoom out and analyze a more holistic view of a potential threat.
  • Allows crisp communication of what they are seeing and make informed decisions to stop bad actors in their tracks effectively.
  • Help them identify commonly targeted assets, how attackers get to them and establish an efficient cybersecurity posture.

Attend the webinar and stand a chance to win our lucky draw prize!

AGENDA

Tuesday, 16 May 2023

SG/MY/HK/PH Time at 11:30 am (GMT +8)
ID/TH/VN/KH/LA Time at 10:30 am (GMT +7)
India Time at 09:00 am (GMT +5.30)

SPEAKERS


Ben ng
PMM
Fortinet

Seong Yee Phang
Principal Consulting Systems Engineer
Fortinet

Tom Scully
Head of Secure Solutions - Defence and Intelligence
Fortinet

Chris Borales
Senior Product Marketing Manager
Fortinet

SESSION DETAILS

Welcome Message and Breaking the Attack Sequence with MITRE ATT&CK

A breach resulting in the loss of data can occur in minutes or hours. Yet, it can take weeks or months for most security breaches to be detected. By that time, the perpetrators and your data are long gone.

To assist with this, security teams needs a combination of tools, strategy, automation and skilled professional to monitor the MITRE Att&CK knowledge base and automate as much of the process as possible so that human resources can be focused on higher-order analysis and response.

In this session, we will go through what the MITRE ATT&CK framework is and how Fortinet solutions plays their part in the framework.

Ben ng
Full Name
Ben ng
Job Title
PMM
Company
Fortinet

Demo 1 – Getting Ahead of Attackers with Early Warning Insights & Deception Technology

This session demonstrates how FortiRecon, FortiDeceptor and FortiSandbox can provide contextual insights into imminent threats to organizations and their digital assets.

The demo covers how these solutions can help to detect any early signs that the adversary might be targeting your organization. By gaining visibility into early warning insights, organization will be better prepared as well as minimizing the impact shall the attack happened in a later stage.

Seong Yee Phang
Full Name
Seong Yee Phang
Job Title
Principal Consulting Systems Engineer
Company
Fortinet
Tom Scully
Full Name
Tom Scully
Job Title
Head of Secure Solutions - Defence and Intelligence
Company
Fortinet

Demo 2 – Stopping Attackers in Their Tracks with Anomaly Detection and NDR

Attackers are getting better at evading perimeter defenses, and after they’ve gotten in, they’re hiding in network blind spots and targeting cloud workloads to achieve their goals. How do you find adversaries after they’ve bypassed your perimeter and evaded endpoint agents?
 
In this session,  Chris Borales will demonstrate the opportunities SOC teams have to hunt for attackers early in the MITRE ATT&CK lifecycle while using FortiNDR Cloud.

  • Introducing the FortiNDR Cloud interface
  • Highlight the MITRE ATT&CK Dashboard
  • Showcasing detection rules for each MITRE ATT&CK technique (Recon, Initial Access and Execution)
  • Highlight FortiNDR Cloud detections, descriptions and prescribed next steps
Chris Borales
Full Name
Chris Borales
Job Title
Senior Product Marketing Manager
Company
Fortinet