there is no need to get training to get the concept of Intel-Driven Defense [1]:
1. Learn the system/technology
2. Learn how to "hack" it
3. Create full defensive coverage from all perspectives
1st step is clear. 2nd step is the problematic one.
as long as we cannot easily share the knowledge, there is no way we could collaborate globally and effectively solve the problem for all.
this is what ATT&CK here for. it allows us to classify the threats and possible "hacking" techniques.
which is allows us to:
- accumulate the knowledge
- share the knowledge
- attach new contexts from different expert areas (i.e. simulation, mitigation, detection, response)
- share the knowledge even further
- mature it, improve it, enrich it, automate exchange
- ???!!?!
- profit.
more detailed free info on the topic could be found in John Lambert's work "The Githubification of InfoSec" [2] (EN) [3] (RU).
you can send your $100 in BTC to this wallet:
15PUN34cHSiLKcBScLiz4vEcGazyrhY2Td
thanks.
[1]
https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf[2]
https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1[3]
https://habr.com/ru/company/microsoft/blog/487584/