Global Information Security Manager – Facility Management Services
“We might see, hypothetically, that we’re good on protecting against ‘initial foothold’ with a particular type of malware, but we are not doing well in protecting data on a certain type of device from being exfiltrated. We can use that information to understand what we need to change. Maybe we see that we are preventing the first five steps of the attack, so it’s unlikely that an attacker will get to the sixth step, where we might have a gap. Using the MITRE framework to break down attacks like this helps us decide where to invest additional resources.”
