Submit Search
Upload
Updates from the Center for Threat-Informed Defense
•
0 likes
•
105 views
AI-enhanced title
M
MITRE ATT&CK
Follow
From ATT&CKcon 4.0 By Jon Baker, MITRE Engenuity Center for Threat-Informed Defense
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 13
Download now
Download to read offline
Recommended
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
MITRE ATT&CK
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
MITRE ATT&CK
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
MITRE ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
MITRE ATT&CK
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom
MITRE ATT&CK
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
MITRE ATT&CK
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
MITRE ATT&CK
Recommended
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
MITRE ATT&CK
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
MITRE ATT&CK
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
MITRE ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
MITRE ATT&CK
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom
MITRE ATT&CK
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
MITRE ATT&CK
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
MITRE ATT&CK
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
MITRE ATT&CK
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
MITRE ATT&CK
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
MITRE ATT&CK
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
MITRE ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
MITRE ATT&CK
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
MITRE ATT&CK
ATT&CKcon Intro
ATT&CKcon Intro
MITRE ATT&CK
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE - ATT&CKcon
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
MITRE ATT&CK
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
MITRE ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
MITRE ATT&CK
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
MITRE ATT&CK
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
MITRE ATT&CK
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
MITRE ATT&CK
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
MITRE ATT&CK
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Katie Nickels
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Harry McLaren
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE - ATT&CKcon
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
MITRE - ATT&CKcon
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
MITRE ATT&CK
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
Marc St-Pierre
More Related Content
What's hot
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
MITRE ATT&CK
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
MITRE ATT&CK
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
MITRE ATT&CK
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
MITRE ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
MITRE ATT&CK
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
MITRE ATT&CK
ATT&CKcon Intro
ATT&CKcon Intro
MITRE ATT&CK
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE - ATT&CKcon
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
MITRE ATT&CK
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
MITRE ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
MITRE ATT&CK
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
MITRE ATT&CK
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
MITRE ATT&CK
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
MITRE ATT&CK
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
MITRE ATT&CK
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Katie Nickels
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Harry McLaren
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE - ATT&CKcon
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
MITRE - ATT&CKcon
What's hot
(20)
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
ATT&CKcon Intro
ATT&CKcon Intro
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
MITRE ATT&CKcon 2018 Keynote: Advancing Infosec, John Lambert, Microsoft
Similar to Updates from the Center for Threat-Informed Defense
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
MITRE ATT&CK
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
Marc St-Pierre
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
Defence and Security Accelerator
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
ijtsrd
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKay
segughana
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
falknoor56
APCERT Updates
APCERT Updates
APNIC
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
SC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to Security
BigData_Europe
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
ebuc
D0.1 V2.0 Project Presentation
D0.1 V2.0 Project Presentation
latifladid
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
Nixu Corporation
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
Security for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
DataSpace Academy
What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
Similar to Updates from the Center for Threat-Informed Defense
(20)
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKay
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
APCERT Updates
APCERT Updates
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
SC7 Workshop 1: BigDataEurope Approach to Security
SC7 Workshop 1: BigDataEurope Approach to Security
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
D0.1 V2.0 Project Presentation
D0.1 V2.0 Project Presentation
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
Security for the IoT - Report Summary
Security for the IoT - Report Summary
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
Intelligence Sharing - The Silver Shield For Prevention Of Cybercrime.pdf
What i learned at issa international summit 2019
What i learned at issa international summit 2019
More from MITRE ATT&CK
Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
MITRE ATT&CK
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
MITRE ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
MITRE ATT&CK
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
MITRE ATT&CK
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
MITRE ATT&CK
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
MITRE ATT&CK
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
MITRE ATT&CK
The case for quishing
The case for quishing
MITRE ATT&CK
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
MITRE ATT&CK
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
MITRE ATT&CK
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
MITRE ATT&CK
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
MITRE ATT&CK
Adjectives for ATT&CK
Adjectives for ATT&CK
MITRE ATT&CK
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
MITRE ATT&CK
More from MITRE ATT&CK
(17)
Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
The case for quishing
The case for quishing
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Adjectives for ATT&CK
Adjectives for ATT&CK
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
Recently uploaded
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Recently uploaded
(20)
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Updates from the Center for Threat-Informed Defense
1.
Updates from the Center
for Threat-Informed Defense October 25, 2023 © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
2.
The Center for
Threat-InformedDefense conducts collaborative R&D projects that improve cyber defense at scale + Membership is: q Highly-sophisticated q Global & cross-sector q Non-governmental Committed to collaborative R&D in the public interest Intel (logo pending) 36 © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
3.
© 2023 MITRE
Engenuity. Approved for public release. Document number CT0086 Arepeatable,scalable,approachtoR&D built on member-powered collaboration Systematically identify challenges Develop solutions together
4.
R&D Problem Areas Cyber
Threat Intelligence Increase operational effectiveness of threat-intel products and advance the global understanding of adversary behaviors. Test & Evaluation Bring the adversary perspective to test and evaluation to understand defensive posture. Defensive Measures Systematically advance our ability to detect and prevent adversary behaviors. Center R&D is made freely-available globally © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
5.
What have we
done lately? © 2023 MITRE Engenuity. Approved for public release. Document number CT0086 ATT&CK Integration into VERIS April 6 ATT&CK Sync May 25 CTI Blueprints June 13 NIST 800-53 Mappings Update June 14 ATT&CK Workbench August 15 TRAM II August 29 Attack Flow 2.1 August 31 Summiting the Pyramid September 13 OceanLotus Adversary Emulation Plan October 12 Sensor Mappings to ATT&CK December 14 R&D Roadmap Blog R&D Publications Annual Impact Report
6.
Problem Threat intel reporting
shows that adversaries are increasingly targeting macOS and Linux systems, and there are no public adversary emulation plans for macOS and Linux. Solution We have created an emulation plan for OceanLotus that starts on macOS and ends on a Linux host with explicit defensive telemetry for a full scope purple teaming perspective. Impact This is the first emulation plan released publicly that enables a purple team operation on macOS and Linux, providing visibility into environments inaccessible with current prior resources. OceanLotus Adversary Emulation Plan © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
7.
Summiting the Pyramid Pyramid
of Pain via David Bianco Show me mimikatz! Show me accesses of credentials in memory! Problem Adversaries can easily evade cyber analytics that are dependent on specific tools or artifacts. Solution Create and apply a methodology to evaluate the dependencies inside analytics and make them more robust by focusing on adversary behaviors. Impact Shift the advantage towards defenders with improved analytics that catch adversaries even as they evolve and detect future campaigns. Summiting the Pyramid © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
8.
Cyber Threat Intel •
Insider Threat TTP Knowledge Base v2 Advance our collective understanding of insider threats • Sightings Ecosystem II Allow defenders to make data-driven decisions Defensive Measures • Measure, Maximize, and Mature Threat-Informed Defense (M3TID) Standardize measurements of defensive ability against adversary behavior and prioritize which adversary behaviors to defend against • Mappings Explorer Explore mapped security controls from the perspective of the ATT&CK techniques they mitigate • Sensor Mappings to ATT&CK What sensors help me find evidence of the adversary’s activity? What are we doing now? © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
9.
More Mappings • What
TTPs do M365 security controls mitigate? • Revise CVE to ATT&CK for Impact looking at CISA KEV list Build upon Attack Flow • Make it easy to visualize Attack Flows for a variety of use cases • Analyze collections of Attack Flows to “predict” next and previous TTP for threat-hunting and incident analysis Cyber Threat Intel • Create guidance for threat modeling with ATT&CK • Create a singular view of TTPs for OT Advance Secure AI • Document known threats to AI systems • Research into AI red teaming & threat mitigation What’s up next? © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
10.
© 2023 MITRE
Engenuity. Approved for public release. Document number CT0086 An R&D organization • Explore new areas like AI, Insider Threat, OT, Risk, … • With a threat-informed approach Focused on impact • Publish foundational resources • Increase accessibility of R&D products Building a global community • EU ATT&CK Community Workshop – May 23 – 24, 2024 • Asia Pacific ATT&CK Community Workshop – Stay tuned for more What’s on the horizon? Our mission: advance the state of the art and the state if the practice in threat-informed defense globally.
11.
How do we
scale threat-informed defense? © 2023 MITRE Engenuity. Approved for public release. Document number CT0086
12.
It takes community ©
2023 MITRE Engenuity. Approved for public release. Document number CT0086 Enable the global community to advance public interest cybersecurity programs through charitable giving. Benefactors are globally recognized for supporting independent research in the public interest. Participants Benefactors Community Participants drive the R&D program with active engagement and funding Benefactors support independent research in the public interest Global adoption leads to impact. Your use cases enable improvement
13.
Changing the game
on the adversary requires a community-wide approach. You play a critical role! Join us and change the game! © 2023 MITRE Engenuity. Approved for public release. Document number CT0086 Follow us on LinkedIn for the latest updates: https://www.linkedin.com/showcase/center-for-threat-informed-defense/ Learn how your organization can get involved
Download now