A recent discussion led by Rick Howard, N2K’s Chief Security Officer and The CyberWire’s Chief Analyst and Senior Fellow, shed light on the latest developments in mapping the MITRE ATT&CK(R) wiki to deployed security systems. The discussion, which took place on The CyberWire’s podcast, featured several notable guests including James Stanley, section chief at the U.S. Cybersecurity and Infrastructure Security Agency (CISA), John Wunder, Department Manager for Cyber Threat Intelligence and Adversary Emulation at MITRE, and Steve Winterfeld, Akamai’s Advisory CISO.
The MITRE ATT&CK framework is a globally recognized knowledge base that provides insights into the tactics and techniques used by adversaries during cyber attacks. By mapping this framework to their own security stack, organizations can gain a better understanding of their security posture and identify vulnerabilities that need to be addressed.
During the podcast, the guests discussed the importance of mapping the MITRE ATT&CK framework to security systems and the benefits it offers in terms of enhancing an organization’s cyber defense capabilities. James Stanley emphasized that by aligning their security controls with the framework, organizations can better detect, prevent, and respond to cyber threats.
John Wunder highlighted the ongoing efforts to update and expand the MITRE ATT&CK framework to ensure it remains relevant and effective in the face of evolving cyber threats. He mentioned that the framework is continually updated to include new adversary techniques and tactics, allowing organizations to stay one step ahead of cybercriminals.
Steve Winterfeld shared his insights on how organizations can leverage the MITRE ATT&CK framework to improve their cybersecurity posture. He emphasized the importance of using the framework to simulate adversarial attacks and test the effectiveness of security controls. This approach allows organizations to identify any gaps or weaknesses in their defenses and take appropriate remedial actions.
The discussion also touched upon the significance of threat intelligence and its role in implementing effective intrusion kill chain strategies. By analyzing adversary campaigns and studying intrusion kill chains, organizations can gain valuable insights into the tactics, techniques, and procedures used by threat actors. This knowledge can then be used to inform defense strategies and strengthen security controls.
Furthermore, the guests discussed the recent surge in crypto thefts and the role played by North Korea’s Lazarus group in fueling these incidents. The Lazarus group, a notorious cybercriminal organization, has been responsible for several high-profile cryptocurrency thefts, including the theft of $625 million from Axie Infinity and $100 million from Harmony bridge. These incidents highlight the need for organizations to enhance their cybersecurity defenses to protect against such sophisticated threats.
To assist organizations in mapping adversary behaviors to the MITRE ATT&CK framework, the Cybersecurity and Infrastructure Security Agency (CISA) has released a web application called Decider. This application helps network defenders, analysts, and researchers streamline the process of mapping adversary behaviors and strengthens defenses against cyber threats.
In conclusion, mapping the MITRE ATT&CK framework to deployed security systems plays a crucial role in enhancing organizations’ cybersecurity defenses. By aligning their security controls with the framework, organizations can gain valuable insights into adversary behaviors, identify vulnerabilities, and take proactive measures to mitigate cyber risks. In an era where cyber threats are becoming increasingly sophisticated, leveraging the MITRE ATT&CK framework is a proactive approach that can significantly improve an organization’s cyber defense capabilities.

