• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • UVCeed Mobile UVC Light Sanitizer for $119

    UVCeed Mobile UVC Light Sanitizer for $119
  • AddStars Reviews: Lifetime Subscription for $59

    AddStars Reviews: Lifetime Subscription for $59
  • Locker Password Manager Premium Plan: Lifetime Subscription for $49

    Locker Password Manager Premium Plan: Lifetime Subscription for $49
  • The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

    The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34
  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

MITRE ATT&CK: The Magic of User Training

Sep 28, 2020 by iHash Leave a Comment


October is National Cybersecurity Awareness Month, and this year the theme is “Do Your Part. #BeCyberSmart.” It reminds all of us — individuals and organizations alike — to be proactive and accountable. Cybersecurity is our shared responsibility, and we can do it together.

At Cisco, we’re thrilled to contribute a monthlong roster of engaging events, activities, and educational content. From executive perspectives to career development, we’ve got you covered. And along those lines, let’s focus this installment of the MITRE ATT&CK Magic of Mitigations blog series on User Training (M1017).

First, let’s talk about cyber training and what it means to you.

What’s your perspective on cyber training?

It probably depends on your role. For instance:

  • If you’re a CISO, responsible for the entire risk management program, then no doubt security awareness and training is already on your long list. Maybe your training program needs improvement, but many priorities are vying for your attention and budget.
  • If you’re a security manager, maybe you feel an ongoing frustration when, despite the security training, people still click on things, write passwords down, or worse. After all, you’re the one on the hook when things go wrong.
  • If you’re a security analyst or incident responder, maybe you’re overwhelmed by the heavy workload and complicated tools of the trade. You’re always under pressure and mistakes are easy to make. You could probably benefit from more product training, if only you had the time, and you probably wonder: Can cyber solutions be more helpful and intuitive? Can they talk to each other and automate some response actions?
  • Or maybe you’re the end user, generally tired of security training. Like you don’t already have enough to do. Can’t security just protect you? Why do you have to think about it all the time?

For years, cybersecurity has been difficult and labor-intensive, hence the need for training in the first place. Do you think it’s possible for security to become easier for everyone? And can the technology just, well, do better?

Here’s what MITRE means

Before we tackle those tough questions, let’s look at how MITRE defines User Training (M1017) in the ATT&CK Enterprise Matrix. By the way, ATT&CK stands for Adversary Tactics, Techniques & Common Knowledge — a long way of saying “this is how hackers behave.”

User Training in this context is about helping end users become more cyber-aware. It teaches them about phishing, social engineering, business email compromise, and other attacks. It encourages vigilance. It’s not so much about training your security team, though. The rest of ATT&CK helps with that.

Now it may not sound like a big deal, but there’s real magic in this Mitigation. User Training actually addresses 14 different ATT&CK Techniques, including the following:

  • Input Capture (T1056). Hackers can trick users into providing access credentials through legit-looking interfaces. It’s the sort of attack that’s hard to prevent, especially when they put malicious code on external portals. But when users are trained on the warning signs, they won’t be fooled so easily.
  • Man in the Browser (T1185). Web browser vulnerabilities open the door for hackers to take information like cookies or inherit digital certificates. So when you encourage users to close browsers when they’re done, you’ve found a simple way to guard against man-in-the-browser attacks.
  • Phishing (T1566). Hackers keep evolving. For example, we see fewer dead giveaways like poor spelling, bad grammar, or distorted images in phishing emails these days. And their content is topical, taking advantage of current trends like pandemic-induced remote work and cloud-based email. Spearphishing (T1566.002) attacks using well-designed social engineering approaches that lull people into letting their guard down. Therefore keeping users trained on the latest phishing methods, and testing them every once in a while, goes a long way.

Of course, User Training is just one of over 40 ATT&CK Mitigations, so MITRE certainly isn’t heaping all of the responsibility on people. But knowledgeable and vigilant end users are definitely magical defenses these days. They’re sharing responsibility with the security team. Now what about your cyber vendors? Are they doing their part?

Here’s what we’re doing

Let’s return to those tougher questions now, the ones about making everyone’s lives easier. At Cisco, we’re making great strides in simplifying security:

  • For you, the CISO: You get a trusted security partner, a clear leader in cybersecurity. We help you manage cyber risks with a comprehensive, integrated security portfolio that’s simple, efficient, and effective. Our buying programs make pricing attractive and buying easy. You benefit from a greatly improved cyber posture, at lower cost, with fewer vendors to manage.
  • For you, the security managers and architects: How about simply better security that’s easy to deploy, integrate, use, scale and manage? From the cloud edge, to applications, to networks, to endpoints, you get modern cybersecurity capabilities that optimize your entire program. You benefit directly from our knowledge and experience through Talos IR Service, which helps you prepare for and respond to attacks. Cisco Security Awareness brings phishing simulation and awareness training packages so you can act now on MITRE’s User Training recommendations.
  • For you, the security team: You get industry-leading security solutions that work together with both Cisco and third-party products. We delivering clear, consistent, intuitive interfaces. And we build security knowledge and Talos threat intelligence into our solutions to accelerate detection and response times. For example, check out the search queries that AMP for Endpoints has already pre-mapped to MITRE ATT&CK.
  • For all end users: You benefit from security that guides you along the way, then gets out of your way. For example, the Duo MFA app not only makes multi-factor authentication fast and easy, it also alerts you to new security updates for your device. And Cisco Umbrella, Email Security, and AMP for Endpoints are all around you, defending you from phishing attacks, harmful websites, malware and ransomware.

As you see, we’re committed to doing our part. Like we said, cybersecurity is a shared responsibility and we’ll do it together.

Connect with us!

Our comprehensive security portfolio integrated through SecureX does so much more that what’s described here. If you’re using MITRE ATT&CK to defend your organization, then check out our detailed whitepaper that maps our solutions to the Enterprise Matrix. It’s on our Cyber Frameworks page along with other helpful resources. And let us know what you think! What guides your cyber decisions? What would you like to see from us?

Throughout October, remember check in regularly to our Cybersecurity Awareness Month page. We have a lot of important cyber resources to share with you!

Beyond that is Infrastructure Security Month in November, so I’ll feature Network Segmentation (M1030) in the next installment. Stay tuned!

 

Share:



Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: ATTCK, Magic, MITRE, training, user

Special Offers

  • UVCeed Mobile UVC Light Sanitizer for $119

    UVCeed Mobile UVC Light Sanitizer for $119
  • AddStars Reviews: Lifetime Subscription for $59

    AddStars Reviews: Lifetime Subscription for $59
  • Locker Password Manager Premium Plan: Lifetime Subscription for $49

    Locker Password Manager Premium Plan: Lifetime Subscription for $49
  • The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

    The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34
  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Apple’s Worldwide Developers Conference returns June 5

Mar 30, 2023 By iHash

UVCeed Mobile UVC Light Sanitizer for $119

Mar 30, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Heard on the Street – 3/30/2023

Welcome to insideBIGDATA’s “Heard on the Street” round-up column! In this regular feature, we highlight thought-leadership commentaries from members of the big data ecosystem. Each edition covers the trends of the day with compelling perspectives that can provide important insights to give you a competitive advantage in the marketplace. We invite submissions with a focus […]

3CX Desktop App Supply Chain Attack Leaves Millions at Risk

Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be an active supply chain attack that’s using digitally signed and rigged installers of the popular voice and video conferencing software to target downstream […]

AddStars Reviews: Lifetime Subscription for $59

Expires June 27, 2023 23:59 PST Buy now and get 90% off KEY FEATURES Why wait for customers to visit your website to see your reviews when AddStars will display them ALL, right where customers are searching – on Google’s search listings. AddStars is an innovative and comprehensive review aggregation tool that provides a range […]

Feed the Beast: How to Get Business Analytics Delivering

In this contributed article, Chonchol Gupta, CEO, Rebirth Analytics, believes that if enterprises want to identify and swerve risk, they require a radical rethink of how they obtain the data that fuels their analytics engines. With a long pedigree in Fintech, InsureTech, and supply chain innovation, Chonchol has more than a decade’s experience as a […]

The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

Expires March 29, 2123 23:59 PST Buy now and get 94% off Blender Character Creator for Video Game Design KEY FEATURES Take your first steps to becoming a 3D character artist – learn everything from modeling to painting to animating the character. The course is the sequel to the highly popular Blender Character Creator course, […]

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. “Clipboard injectors […] can be silent for years, show no network activity or any other signs of presence until the disastrous […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT