{"id":82750,"date":"2025-02-11T10:26:00","date_gmt":"2025-02-11T10:26:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82750"},"modified":"2025-09-04T13:51:29","modified_gmt":"2025-09-04T13:51:29","slug":"navigating-threat-landscape-heatmap-insights-mitre-attack","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/","title":{"rendered":"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82750\" class=\"elementor elementor-82750\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f74106 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9f74106\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99e9908\" data-id=\"99e9908\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0bbe74 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a0bbe74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: February 11, 2025<\/div><div><strong>Time<\/strong>: 7:00 AM PST | 9:00 AM CST | 8:30 PM IST<\/div><div><p><strong>Topic<\/strong>: Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:\u00a0<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">In a constantly evolving threat landscape, understanding and prioritizing threats are critical to an organization\u2019s cybersecurity strategy. This webinar, Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK, explores how to leverage the MITRE ATT&amp;CK framework to create actionable heatmaps that identify and score the most relevant threats to your organization. By integrating threat intelligence, control effectiveness assessments, and real-world attack data, attendees will learn how to align their defensive strategies to emerging threats and improve their overall security posture.<\/span><\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li><strong>Practical Application of MITRE ATT&amp;CK:<\/strong> Learn how to create and interpret heatmaps that visualize and prioritize threats effectively.<\/li><li><strong>Control Effectiveness Scoring:<\/strong> Understand methods to score the effectiveness of logging, prevention, detection, and response measures against identified TTPs.<\/li><li><strong>Integrating Threat Intelligence: <\/strong>Discover how to enhance heatmaps with external and internal threat intelligence for comprehensive analysis.<\/li><li><strong>Identifying Gaps and Weaknesses:<\/strong> Gain insights into identifying zero-coverage areas while prioritizing controls for high-risk TTPs.<\/li><li><strong>Cross-Departmental Collaboration: <\/strong>Explore strategies for using heatmaps as a tool to foster collaboration across security teams and departments.<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/01\/Mark-Mackensen.jpg\" alt=\" Mark Mackensen\" width=\"192\" height=\"256\" \/><strong>Mark Mackensen,<\/strong> Lead Threat Intelligence Analyst, Paylocity<\/p><p><strong>Bio:<\/strong> Senior Cyber Threat Analyst at Paylocity, Mark Mackensen brings over a decade of cybersecurity expertise, with a specific focus on <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">Cyber Threat Intelligence (CTI)<\/a> and Threat Hunting. Currently leading Paylocity\u2019s CTI and Threat Hunting programs, Mark has been pivotal in developing these initiatives from inception to operational maturity. This includes crafting tailored methodologies, frameworks, and protocols that enhance incident response capabilities and fortify overall security posture. Prior to Paylocity, Mark managed a global team of threat intelligence analysts at General Dynamics Information Technology for the Department of Defense. There, he focused on leveraging the MITRE ATT&amp;CK framework, improving intelligence sharing, and guiding a team through comprehensive threat intelligence cycles\u2014ultimately delivering actionable intelligence critical for security operations. Mark\u2019s leadership extended to managing the West Coast threat intelligence team, emphasizing operational excellence and strategic mentorship.<\/p><\/div><p><a name=\"attend\"><\/a><\/p><p><iframe src=\"https:\/\/www.youtube.com\/embed\/ucSqEVmPH20?si=2E7FB3Qp-fCxsxSD\" width=\"560\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><br \/><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 11, 2025Time: 7:00 AM PST | 9:00 AM CST | 8:30 PM IST Topic: Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK Watch Now Abstract:\u00a0In a constantly evolving threat landscape, understanding and prioritizing threats are critical to an organization\u2019s cybersecurity strategy. This webinar, Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK,&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82750","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using MITRE ATT&amp;CK Heatmaps to Visualize and Prioritize Cybersecurity Risks<\/title>\n<meta name=\"description\" content=\"Learn how to use MITRE ATT&amp;CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK\" \/>\n<meta property=\"og:description\" content=\"Learn how to use MITRE ATT&amp;CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T10:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T13:51:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK\",\"datePublished\":\"2025-02-11T10:26:00+00:00\",\"dateModified\":\"2025-09-04T13:51:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/\"},\"wordCount\":359,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-1-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/\",\"name\":\"Using MITRE ATT&CK Heatmaps to Visualize and Prioritize Cybersecurity Risks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-1-1.jpg\",\"datePublished\":\"2025-02-11T10:26:00+00:00\",\"dateModified\":\"2025-09-04T13:51:29+00:00\",\"description\":\"Learn how to use MITRE ATT&CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-1-1.jpg\",\"width\":931,\"height\":620,\"caption\":\"Threat Management Strategies\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-threat-landscape-heatmap-insights-mitre-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using MITRE ATT&CK Heatmaps to Visualize and Prioritize Cybersecurity Risks","description":"Learn how to use MITRE ATT&CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/","og_locale":"en_US","og_type":"article","og_title":"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK","og_description":"Learn how to use MITRE ATT&CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-02-11T10:26:00+00:00","article_modified_time":"2025-09-04T13:51:29+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK","datePublished":"2025-02-11T10:26:00+00:00","dateModified":"2025-09-04T13:51:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/"},"wordCount":359,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/","name":"Using MITRE ATT&CK Heatmaps to Visualize and Prioritize Cybersecurity Risks","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg","datePublished":"2025-02-11T10:26:00+00:00","dateModified":"2025-09-04T13:51:29+00:00","description":"Learn how to use MITRE ATT&CK heatmaps to visualize threats, prioritize cybersecurity risks, and improve defenses with actionable insights and real-world strategies.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-1-1.jpg","width":931,"height":620,"caption":"Threat Management Strategies"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-threat-landscape-heatmap-insights-mitre-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Navigating the Threat Landscape: Heatmap Insights via MITRE ATT&amp;CK"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82750"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82750\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82764"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}