WELCOME
Defending against cyberattacks today requires security teams to work smarter, not harder. Cyber criminal strategies target every link, from gathering information, gaining access, moving laterally across the network, discovering resources to target and to evade detection while exfiltrating data.
Join us in the first of this 2-part webinar series to learn how security teams can use a combination of tools, strategy, automation to monitor the MITRE ATT&CK and automate as much of the process as possible.
Understanding MITRE ATT&CK flow:
- Enables security teams to zoom out and analyze a more holistic view of a potential threat.
- Allows crisp communication of what they are seeing and make informed decisions to stop bad actors in their tracks effectively.
- Help them identify commonly targeted assets, how attackers get to them and establish an efficient cybersecurity posture.
Attend the webinar and stand a chance to win our lucky draw prize!
Tuesday, 16 May 2023
SG/MY/HK/PH Time at 11:30 am (GMT +8)
ID/TH/VN/KH/LA Time at 10:30 am (GMT +7)
India Time at 09:00 am (GMT +5.30)
Welcome Message and Breaking the Attack Sequence with MITRE Att&CK | 11:30 AM - 11:45 AM | |
Demo 1 – Getting Ahead of Attackers with Early Warning Insights & Deception Technology | 11:45 AM - 12:05 PM | |
Demo 2 – Stopping Attackers in Their Tracks with Anomaly Detection and NDR | 12:05 PM - 12:15 PM | |
Closing and Lucky Draw | 12:15 PM - 12:30 PM |
SPEAKERS
SESSION DETAILS
Welcome Message and Breaking the Attack Sequence with MITRE ATT&CK
A breach resulting in the loss of data can occur in minutes or hours. Yet, it can take weeks or months for most security breaches to be detected. By that time, the perpetrators and your data are long gone.
To assist with this, security teams needs a combination of tools, strategy, automation and skilled professional to monitor the MITRE Att&CK knowledge base and automate as much of the process as possible so that human resources can be focused on higher-order analysis and response.
In this session, we will go through what the MITRE ATT&CK framework is and how Fortinet solutions plays their part in the framework.

Demo 1 – Getting Ahead of Attackers with Early Warning Insights & Deception Technology
This session demonstrates how FortiRecon, FortiDeceptor and FortiSandbox can provide contextual insights into imminent threats to organizations and their digital assets.
The demo covers how these solutions can help to detect any early signs that the adversary might be targeting your organization. By gaining visibility into early warning insights, organization will be better prepared as well as minimizing the impact shall the attack happened in a later stage.


Demo 2 – Stopping Attackers in Their Tracks with Anomaly Detection and NDR
Attackers are getting better at evading perimeter defenses, and after they’ve gotten in, they’re hiding in network blind spots and targeting cloud workloads to achieve their goals. How do you find adversaries after they’ve bypassed your perimeter and evaded endpoint agents?
In this session, Chris Borales will demonstrate the opportunities SOC teams have to hunt for attackers early in the MITRE ATT&CK lifecycle while using FortiNDR Cloud.
- Introducing the FortiNDR Cloud interface
- Highlight the MITRE ATT&CK Dashboard
- Showcasing detection rules for each MITRE ATT&CK technique (Recon, Initial Access and Execution)
- Highlight FortiNDR Cloud detections, descriptions and prescribed next steps
