|
4 | 4 | "name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)", |
5 | 5 | "date": "January 2020", |
6 | 6 | "presenters": "Sarah Yoder and Jackie Lasky", |
7 | | - "url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", |
| 7 | + "slides": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", |
8 | 8 | "description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)." |
9 | 9 | }, |
10 | 10 | { |
|
33 | 33 | "name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense", |
34 | 34 | "date": "September 2019", |
35 | 35 | "presenters": "Adam Pennington", |
36 | | - "url": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", |
| 36 | + "slides": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", |
37 | 37 | "description": "This presentation from the RH-ISAC Retail Cyber Intelligence Summit covers all four of the primary ATT&CK use cases, with a focus on detection and analytics, and assessments and engineering." |
38 | 38 | }, |
39 | 39 | { |
|
63 | 63 | "name": "Finding Dependencies Between Adversary Techniques", |
64 | 64 | "date": "June 2019", |
65 | 65 | "presenters": "Andy Applebaum", |
66 | | - "url": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", |
| 66 | + "slides": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", |
67 | 67 | "description": "This presentation from the Annual FIRST Conference presents different methods of using ATT&CK to find dependencies between adversary techniques to support defense." |
68 | 68 | }, |
69 | 69 | { |
|
101 | 101 | "name": "Turning Intelligence into Action with MITRE ATT&CK", |
102 | 102 | "date": "March 2019", |
103 | 103 | "presenters": "Katie Nickels and Adam Pennington", |
104 | | - "url": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", |
| 104 | + "slides": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", |
105 | 105 | "description": "This presentation from the FIRST CTI Symposium discusses how you can use ATT&CK for threat intelligence as well as biases to be aware of as you do that." |
106 | 106 | }, |
107 | 107 | { |
|
152 | 152 | "name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK", |
153 | 153 | "date": "September 2018", |
154 | 154 | "presenters": "Katie Nickels and Cody Thomas", |
155 | | - "url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", |
| 155 | + "slides": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", |
156 | 156 | "description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation." |
157 | 157 | }, |
158 | 158 | { |
|
204 | 204 | "name": "Leveraging Campaigns to Untangle the Threat Group Ship of Theseus", |
205 | 205 | "date": "January 2023", |
206 | 206 | "presenters": "Adam Pennington", |
207 | | - "url": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", |
| 207 | + "slides": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", |
208 | 208 | "description": "This presentation introduces ATT&CK's newer categorization of Campaigns - a method of classification that more easily enables the tracking of the abilities and sophistication over time, in addition to enabling stakeholders to better identify potential targets based on industry" |
209 | 209 | }, |
210 | 210 | { |
|
260 | 260 | "name": "Which Way is the Solar Wind Blowing - CloudSecNext Summit & Training 2021", |
261 | 261 | "date": "June 2021", |
262 | 262 | "presenters": "Jamie Williams and Blake Storm", |
263 | | - "url": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", |
| 263 | + "slides": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", |
264 | 264 | "description": "This presentation provides a walkthrough of the SolarWinds attack at each stage of the attack, then shows how each of those steps correspond to portions of the ATT&CK Cloud framework" |
265 | 265 | }, |
266 | 266 | { |
|
0 commit comments