Skip to content

Commit 3145edb

Browse files
authored
Merge pull request #547 from mitre-attack/develop
fix slide deck urls and add new benefactor
2 parents e379541 + 1cbb1e0 commit 3145edb

File tree

4 files changed

+24
-17
lines changed

4 files changed

+24
-17
lines changed
24 KB
Loading

data/resources.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
"name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)",
55
"date": "January 2020",
66
"presenters": "Sarah Yoder and Jackie Lasky",
7-
"url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it",
7+
"slides": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it",
88
"description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)."
99
},
1010
{
@@ -33,7 +33,7 @@
3333
"name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense",
3434
"date": "September 2019",
3535
"presenters": "Adam Pennington",
36-
"url": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense",
36+
"slides": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense",
3737
"description": "This presentation from the RH-ISAC Retail Cyber Intelligence Summit covers all four of the primary ATT&CK use cases, with a focus on detection and analytics, and assessments and engineering."
3838
},
3939
{
@@ -63,7 +63,7 @@
6363
"name": "Finding Dependencies Between Adversary Techniques",
6464
"date": "June 2019",
6565
"presenters": "Andy Applebaum",
66-
"url": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf",
66+
"slides": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf",
6767
"description": "This presentation from the Annual FIRST Conference presents different methods of using ATT&CK to find dependencies between adversary techniques to support defense."
6868
},
6969
{
@@ -101,7 +101,7 @@
101101
"name": "Turning Intelligence into Action with MITRE ATT&CK",
102102
"date": "March 2019",
103103
"presenters": "Katie Nickels and Adam Pennington",
104-
"url": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck",
104+
"slides": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck",
105105
"description": "This presentation from the FIRST CTI Symposium discusses how you can use ATT&CK for threat intelligence as well as biases to be aware of as you do that."
106106
},
107107
{
@@ -152,7 +152,7 @@
152152
"name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK",
153153
"date": "September 2018",
154154
"presenters": "Katie Nickels and Cody Thomas",
155-
"url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck",
155+
"slides": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck",
156156
"description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation."
157157
},
158158
{
@@ -204,7 +204,7 @@
204204
"name": "Leveraging Campaigns to Untangle the Threat Group Ship of Theseus",
205205
"date": "January 2023",
206206
"presenters": "Adam Pennington",
207-
"url": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus",
207+
"slides": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus",
208208
"description": "This presentation introduces ATT&CK's newer categorization of Campaigns - a method of classification that more easily enables the tracking of the abilities and sophistication over time, in addition to enabling stakeholders to better identify potential targets based on industry"
209209
},
210210
{
@@ -260,7 +260,7 @@
260260
"name": "Which Way is the Solar Wind Blowing - CloudSecNext Summit & Training 2021",
261261
"date": "June 2021",
262262
"presenters": "Jamie Williams and Blake Storm",
263-
"url": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready",
263+
"slides": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready",
264264
"description": "This presentation provides a walkthrough of the SolarWinds attack at each stage of the attack, then shows how each of those steps correspond to portions of the ATT&CK Cloud framework"
265265
},
266266
{

modules/benefactors/templates/benefactors.html

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -222,15 +222,20 @@ <h4>Supporters</h4>
222222
url: "https://www.nab.com.au",
223223
title: "National Australia Bank"
224224
},
225-
{
226-
logo: "/theme/images/benefactors/siemens.png",
227-
url: "https://www.siemens.com/global/en/company/about.html",
228-
title: "Siemens AG"
225+
{
226+
logo: "/theme/images/benefactors/secpod.png",
227+
url: "https://www.secpod.com",
228+
title: "SecPod"
229229
}
230230
],
231231
},
232232
{
233233
sponsors: [
234+
{
235+
logo: "/theme/images/benefactors/siemens.png",
236+
url: "https://www.siemens.com/global/en/company/about.html",
237+
title: "Siemens AG"
238+
},
234239
{
235240
logo: "/theme/images/benefactors/SOC-prime-logo.png",
236241
url: "https://socprime.com",
@@ -245,16 +250,16 @@ <h4>Supporters</h4>
245250
logo: "/theme/images/benefactors/standard_chartered.png",
246251
url: "https://www.sc.com/en/",
247252
title: "Standard Chartered"
248-
},
249-
{
250-
logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png",
251-
url: "https://www.tidalcyber.com",
252-
title: "Tidal Cyber"
253253
}
254254
],
255255
},
256256
{
257257
sponsors: [
258+
{
259+
logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png",
260+
url: "https://www.tidalcyber.com",
261+
title: "Tidal Cyber"
262+
},
258263
{
259264
logo: "/theme/images/benefactors/ZIMPERIUM-logo_blackBG.png",
260265
url: "https://www.zimperium.com",

modules/resources/templates/presentation-archive.html

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,7 @@ <h6 class="presentation-count"></h6>
8282
</div>
8383
<p></p>
8484
<div class="material">
85+
{% if "url" in presentation %}
8586
<a href="{{ presentation.url }}">
8687
<button type="button" class="slide-button">
8788
<span class="slide-button-text">
@@ -94,8 +95,9 @@ <h6 class="presentation-count"></h6>
9495
</span>
9596
</button>
9697
</a>
98+
{% endif %}
9799
{% if "slides" in presentation %}
98-
<a class="my-2 ml-2" href="{{ presentation.slides }}">
100+
<a class="my-2 {% if 'url' in presentation %}ml-2{% endif %}" href="{{ presentation.slides }}">
99101
<button type="button" class="slide-button slide-button-secondary">
100102
<span class="slide-button-text">
101103
<span>

0 commit comments

Comments
 (0)