WEBVTT

00:00.319 --> 00:04.545
>> Welcome to the fifth and
final lesson of Module 3.

00:04.545 --> 00:08.230
Putting it all together and
to threaten form defense.

00:09.410 --> 00:12.480
In this lesson, we
will highlight and

00:12.480 --> 00:14.160
appreciate how attack helps

00:14.160 --> 00:16.990
us make better
cybersecurity decisions.

00:19.580 --> 00:23.715
As we previously discussed,
cybersecurity is hard,

00:23.715 --> 00:26.085
but it can be a lot easier
when we coordinate,

00:26.085 --> 00:30.010
communicate, and work together
towards a common goal.

00:32.360 --> 00:34.860
One of the central themes of

00:34.860 --> 00:38.280
this module has been not
to forget why we do this,

00:38.280 --> 00:42.000
particularly every action
and decision we make,

00:42.000 --> 00:44.570
use to reflect back to
how it's going to improve

00:44.570 --> 00:45.830
our ability to defend against

00:45.830 --> 00:48.300
our threats and their behaviors.

00:52.090 --> 00:54.920
As we've shown, ATT&CK gives us

00:54.920 --> 00:57.200
a quantifiable way
of understanding,

00:57.200 --> 00:58.714
tracking, communicating,

00:58.714 --> 01:01.610
and addressing what
our threats are doing.

01:01.610 --> 01:04.160
We can use this
knowledge to gain

01:04.160 --> 01:06.890
strategic and operational
advantages by

01:06.890 --> 01:09.350
identifying and understanding
what adversaries are

01:09.350 --> 01:13.710
doing and working towards
defending it as a community.

01:16.760 --> 01:20.650
With that, we restart
knowledge check for Lesson 5.

01:20.650 --> 01:23.465
Threatened form
defense involves.

01:23.465 --> 01:26.120
Please pause the video
and take a second

01:26.120 --> 01:29.430
to select the correct
answer before proceeding.

01:33.040 --> 01:35.645
In this case, the
correct answer was

01:35.645 --> 01:40.870
e. Threaten from defense
involves the people,

01:40.870 --> 01:43.805
processes in any other
action or decision.

01:43.805 --> 01:46.410
It truly is a team effort.

01:48.920 --> 01:52.420
With that, we've reached
the end of Lesson 5.

01:52.420 --> 01:54.860
In summary, ATT&CK,

01:54.860 --> 01:56.450
specifically through
our understanding of

01:56.450 --> 01:58.175
threats and their behaviors,

01:58.175 --> 02:00.980
can help us make and
communicate threat-informed,

02:00.980 --> 02:02.630
and better decisions across

02:02.630 --> 02:06.090
all aspects of
cybersecurity operations.

02:09.500 --> 02:13.455
With that, we've reached
the end of Module 3.

02:13.455 --> 02:17.180
In summary, we explore
the various ways of

02:17.180 --> 02:20.480
operationalizing the knowledge
capture with an ATT&CK and

02:20.480 --> 02:22.340
how this accumulates
into the idea of

02:22.340 --> 02:24.440
threaten from
defense or applying

02:24.440 --> 02:26.720
an understanding of our
adversary tradecraft

02:26.720 --> 02:28.790
and their behaviors to prevent,

02:28.790 --> 02:32.580
detect, and respond
to cyber attacks.

02:34.360 --> 02:36.755
For more great information,

02:36.755 --> 02:39.215
definitely check out
our ATT&CK eBook,

02:39.215 --> 02:41.210
as well as don't forget
to check out the rest of

02:41.210 --> 02:43.980
the MITRE ATT&CK Defender
learning courses.

