Table of Contents
- SOC Basics – Structure, Personnel, Coverage, and Tools
- Analyzing Your Environment for Potential Pitfalls
- Reviewing Different Threat Models
- What is the ATT&CK Framework?
- A Deep Dive into the ATT&CK Framework
- Strategies to Map to ATT&CK
- Common Mistakes with Implementation
- Return on Investment Detections
- What Happens After an Alert is Triggered?
- Validating Any Mappings and Detections
- Implementing ATT&CK in All Parts of Your SOC
- What's Next? Areas for Innovation in Your SOC

