Ronan Lavelle

Home|Ronan Lavelle CEO, Elasticito

About Ronan Lavelle CEO, Elasticito

This author has not yet filled in any details.
So far Ronan Lavelle CEO, Elasticito has created 2 blog entries.

Using Breach and Attack Simulation with MITRE ATT&CK to highlight threat actor behaviours

MITRE ATT&CK is a phenomenal global free knowledge base produced by MITRE, a US Government research organisation, that maps adversary tactics and techniques that are used by threat actors to launch cyber attacks against targets.  The ATT&CK framework (which stands for Adversarial Tactics, Techniques, and Common Knowledge) began its life in 2013 and now incorporates a vast array of Tactics, Techniques and Procedures (TTPs). As Sun Tzu famously wrote in The Art of War, 'Know your enemy ...' - this is about understanding how cyber adversaries operate and what tactics and techniques they use when conducting reconnaissance on a target and launching an attack, with the aim to try and disrupt their activity to make an attack too complex or too costly for the attacker to pursue. MITRE ATT&CK Navigator The MITRE ATT&CK Navigator is used to map and filter adversary TTPs in order to understand the phases and techniques

By |2020-04-07T06:55:30+00:00April 6th, 2020|Blog|0 Comments

Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties

Using the FAIR Model to quantify Cyber Risk for 3rd parties - Recorded webinar View webinar recording Understanding the true and realistic financial impact on the cyber risk that key 3rd party organisations pose to your business has been a hugely complex and expensive challenge to solve. Until now. Join this webinar to learn more about how NormShield has incorporated the Fair® cyber risk quantification model into its cyber risk assessment platform to provide instant and dynamic visibility of the financial impact and likelihood of a breach with 3rd parties that you do business with. If your business could be affected by a major cyber incident with one of your 3rd parties, you should attend this session. Suggested audience: - CISOs - Cyber risk/GRC specialists - Third Party Risk Managers - IT Governance professionals View webinar recording

By |2020-03-11T10:52:47+00:00February 25th, 2020|Events|0 Comments