{"id":89338,"date":"2018-06-18T21:01:25","date_gmt":"2018-06-19T04:01:25","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=89338"},"modified":"2025-05-27T22:24:47","modified_gmt":"2025-05-28T05:24:47","slug":"apply-mitres-attck-model-to-check-your-defenses","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/","title":{"rendered":"Apply MITRE\u2019s \u2018ATT&#038;CK\u2019 Model to Check Your Defenses"},"content":{"rendered":"<p>Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft of intellectual property are some of the motivations. Besides these, we have seen during the past two years an increase in attacks in which adversaries are not shy of leaving a trail of destruction. One might wonder how to deal with these kinds of threats and where to start.<\/p>\n<p>Sun Tzu\u2019s <em>The Art of War<\/em> contains some great wisdom regarding the strategy of warfare. One of the most popular is the advice \u201cIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.\u201d<\/p>\n<p>Applying this advice to information security, let\u2019s focus first on knowing yourself. Knowing yourself can roughly be divided into two parts:<\/p>\n<ul>\n<li>What do I have that can be of value to an attacker?<\/li>\n<li>How do I detect, protect, and correct any threats to my identified value?<\/li>\n<\/ul>\n<p>Every company has a value, it takes only one criminal mind to see that and to attempt to exploit it. Ask yourself what the core of your business is, the secret sauce that people might be after, what will take you out of business, whom you are doing business with, who are your clients, etc.<\/p>\n<p>Once you have identified your organization\u2019s value, the second part of knowing yourself comes into play. You must understand where you to focus your defenses and invest in technology to detect and protect against threats.<\/p>\n<p>After wrapping up the knowing yourself part, what can we learn from the enemy? Ask yourself \u201cWho would likely be interested in attacking me?\u201d By going through the list of known adversaries and cybercriminal groups, you can create a list based on which geographies and vectors they target and classify them by risk. Here is a simplified example:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-89351\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\" alt=\"\" width=\"546\" height=\"116\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png 546w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1-300x64.png 300w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/a><\/p>\n<p>Once you have your list and risk classification ready, you must next study the tactics, techniques, and procedures used by these adversaries. For mapping their techniques and associated campaigns, we use the <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cybersecurity\/what-is-mitre-attack-framework.html\">MITRE<\/a> Adversarial Tactics, Techniques, and Common Knowledge model (ATT&amp;CK). The matrix covers hundreds of techniques, and can be applied for different purposes. In this case, we will focus on the risk versus mapping the defensive architecture.<\/p>\n<p>In Q1 of 2018, we mapped the targeted attacks discovered by ourselves and our peers in the industry. The following example comes from one adversary we tracked, showing the techniques they used:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-89352\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2.png\" alt=\"\" width=\"3000\" height=\"1446\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2.png 3000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2-300x145.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2-768x370.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2-1024x494.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-2-1037x500.png 1037w\" sizes=\"auto, (max-width: 3000px) 100vw, 3000px\" \/><\/a><\/p>\n<p><em>With MITRE\u2019s Navigator tool you can select an actor or malware family. After making the selection, the boxes in the matrix show which techniques the actor or malware has used.<\/em><\/p>\n<p>From these techniques we can learn how our environments protect against these techniques and where we have gaps. The goal is not to create coverage or signatures for each technique; the matrix helps organizations understand how attackers behave. Having more visibility into their methods leads us to the right responses, and helps us contain and eradicate attacks in a coordinated way. By comparing the multiple actors from your initial risk assessment, you can build the matrix from the perspective of high\/medium\/low risk and map it against your defenses.<\/p>\n<p>Although some adversaries might not have a history of attacking you and your sector, it is still good to ask yourself \u201cWhat if we were a target?\u201d Would your environment create enough visibility to detect and deal with these techniques?<\/p>\n<h2><strong>Statistics<\/strong><\/h2>\n<p>When we looked at the first quarter, we noticed that the three techniques were the most popular in the category of Privilege Escalation:<\/p>\n<ul>\n<li>Exploitation of vulnerability<\/li>\n<li>Process injection<\/li>\n<li>Valid accounts<\/li>\n<\/ul>\n<p>To determine your coverage and detection capacity, you should ask if the exploits used completely new vulnerabilities (no patches available) or if they had existed for a while. Would your environment have the right patches installed or are you missing them and have to take action?<\/p>\n<p>When we looked at the categories of Exfiltration and Command and Control, most campaigns exfiltrated their data over a control server channel using a common port. That translates to either TCP port 80 (HTTP) or TCP port 443 (HTTPS). We all use these ports from inside the network to communicate to the internet. What if all my other defenses would fail to discover the suspicious activity? Which defensive components in my network would be able to inspect the outgoing traffic and block or flag the exfiltration attempts?<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>In this post, we highlighted one approach and application of the ATT&amp;CK model. There are many ways to apply it for red teaming, threat hunting, and other tasks. At McAfee we embrace the model and are applying it to different levels and purposes in our organization. We are not only using it <a href=\"https:\/\/attack.mitre.org\/wiki\/Contribute\" target=\"_blank\" rel=\"noopener noreferrer\">but also contribute<\/a> to the model by describing newly discovered techniques used by adversaries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and&#8230;<\/p>\n","protected":false},"author":653,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,1814,4452,180],"coauthors":[3576],"class_list":["post-89338","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-computer-security","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apply MITRE\u2019s \u2018ATT&amp;CK\u2019 Model to Check Your Defenses | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apply MITRE\u2019s \u2018ATT&amp;CK\u2019 Model to Check Your Defenses | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-19T04:01:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:24:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"546\" \/>\n\t<meta property=\"og:image:height\" content=\"116\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christiaan Beek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ChristiaanBeek\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christiaan Beek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\"},\"author\":{\"name\":\"Christiaan Beek\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\"},\"headline\":\"Apply MITRE\u2019s \u2018ATT&#038;CK\u2019 Model to Check Your Defenses\",\"datePublished\":\"2018-06-19T04:01:25+00:00\",\"dateModified\":\"2025-05-28T05:24:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\",\"keywords\":[\"Advanced Threat Research\",\"computer security\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\",\"name\":\"Apply MITRE\u2019s \u2018ATT&CK\u2019 Model to Check Your Defenses | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\",\"datePublished\":\"2018-06-19T04:01:25+00:00\",\"dateModified\":\"2025-05-28T05:24:47+00:00\",\"description\":\"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Apply MITRE\u2019s \u2018ATT&#038;CK\u2019 Model to Check Your Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\",\"name\":\"Christiaan Beek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"caption\":\"Christiaan Beek\"},\"description\":\"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \\\"Hacking Exposed\\\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/christiaanbeek\/\",\"https:\/\/x.com\/ChristiaanBeek\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apply MITRE\u2019s \u2018ATT&CK\u2019 Model to Check Your Defenses | McAfee Blog","description":"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Apply MITRE\u2019s \u2018ATT&CK\u2019 Model to Check Your Defenses | McAfee Blog","og_description":"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-06-19T04:01:25+00:00","article_modified_time":"2025-05-28T05:24:47+00:00","og_image":[{"width":546,"height":116,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png","type":"image\/png"}],"author":"Christiaan Beek","twitter_card":"summary_large_image","twitter_creator":"@ChristiaanBeek","twitter_site":"@McAfee","twitter_misc":{"Written by":"Christiaan Beek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/"},"author":{"name":"Christiaan Beek","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79"},"headline":"Apply MITRE\u2019s \u2018ATT&#038;CK\u2019 Model to Check Your Defenses","datePublished":"2018-06-19T04:01:25+00:00","dateModified":"2025-05-28T05:24:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/"},"wordCount":843,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png","keywords":["Advanced Threat Research","computer security","cybersecurity","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/","name":"Apply MITRE\u2019s \u2018ATT&CK\u2019 Model to Check Your Defenses | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png","datePublished":"2018-06-19T04:01:25+00:00","dateModified":"2025-05-28T05:24:47+00:00","description":"Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/2018-06-05-Mitre-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/apply-mitres-attck-model-to-check-your-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Apply MITRE\u2019s \u2018ATT&#038;CK\u2019 Model to Check Your Defenses"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79","name":"Christiaan Beek","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","caption":"Christiaan Beek"},"description":"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \"Hacking Exposed\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.","sameAs":["https:\/\/www.linkedin.com\/in\/christiaanbeek\/","https:\/\/x.com\/ChristiaanBeek"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/653"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=89338"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89338\/revisions"}],"predecessor-version":[{"id":214553,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89338\/revisions\/214553"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=89338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=89338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=89338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=89338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}