

One of the biggest challenges in cybersecurity is not technical, it is communication.
SOC, CTI, Red Team, Blue Team, GRC, security awareness, and executive management teams often talk about the same threats, but use different languages. The result is misalignment, noise, increased risk of exposure to attacks, and decisions based on divergent interpretations. It is exactly at this point that the MITRE ATT&CK framework has consolidated itself as something greater than a mere technical basis: it has become a common language for cybersecurity.
The problem: teams speak “security” in different dialects
Consider common day-to-day situations:
Everyone is right — but without a common vocabulary, integration is lost. When an analyst says “we detected suspicious behavior on the endpoint,” what exactly does that mean?
When CTI warns about an active group, how does that translate into practical action?
What is MITRE ATT&CK
The MITRE ATT&CK is a knowledge base that describes how real adversaries conduct attacks, and it is organized by:
It is maintained by MITRE, a non-profit organization that operates research centers funded by the US government, and is updated based on real observations of attack campaigns. The key point: ATT&CK describes behavior, not specific tools.
ATT&CK as a translator between teams
The great value of MITRE ATT&CK lies in its ability to translate contexts between disciplines.
CTI → SOC
When CTI says:
“This group uses Credential Dumping followed by Lateral Movement via SMB”
The SOC knows exactly:
It is no longer an abstract alert; it is a clear operational hypothesis.
CTI → Red Team
The Red Team stops simulating generic attacks and starts to:
Result: more realistic and actionable exercises.
SOC / Red Team → GRC
With ATT&CK, the discourse changes from:
“We have X vulnerabilities”
To:
“We have low detection coverage for exfiltration techniques used by groups that attack our sector”
This connects threat → risk → decision.
CTI → Security Awareness
Without a common model, the discourse is usually generic:
“We need to train users against phishing.”
With CTI integrated into awareness, the discourse changes to:
“We are observing active campaigns that use HR pretexts and password reset links, exploiting Phishing and Valid Accounts techniques associated with groups that already attack companies in our sector.”
This change allows for:
In August 2025, I presented a lecture specifically on how CTI can support awareness areas. Full presentation available at
True Crime: CTI as the Basis for Cybersecurity Education – Carlos Cabral | HumanConf 2025
ATT&CK in practice: concrete examples
Imagine the following scenario:
From this:
All of this using the same reference.
ATT&CK is not a checklist — it is context
A common mistake is to treat MITRE ATT&CK as:
In practice, covering 100% of ATT&CK is unfeasible and unnecessary. The real value lies in:
Why ATT&CK is essential for CTI
For Cyber Threat Intelligence, ATT&CK is the link between:
It allows for:
Without this, CTI runs the risk of becoming merely a producer of interesting, but not very actionable, reports.
To conclude
Cybersecurity is a collective effort.
And collective efforts, without a common language, end in confusion. In security, confusion is vulnerability. MITRE ATT&CK does not solve all problems — but it solves one of the most critical: alignment.
When everyone speaks the same language: