diff --git a/CHANGELOG.md b/CHANGELOG.md index c207ffb63da..d70292b35b3 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -62,7 +62,7 @@ ## Misc -* Added Lightning Talk YouTube links for ATT&CKCon 4.0 +* Added Lightning Talk YouTube links for ATT&CKcon 4.0 ## Bugfixes diff --git a/data/attackcon.json b/data/attackcon.json index b0345f26bc8..ab787cad672 100644 --- a/data/attackcon.json +++ b/data/attackcon.json @@ -318,7 +318,7 @@ "organization": "LLC" } ], - "description": "How \"hard\" is it to do a given ATT&CK technique? Are they all the same? Clearly Phishing is a lot easier than Hardware additions for initial access. How many ATT&CK techniques can be done within a budget of say $1000? Answering these questions is a powerful step towards knowing what kinds of threats you will face. Building on the ATTCKCon 4.0 Lightning Talk \"Adjectives for ATT&CK\", this presentation continues the work of organizing offensive techniques into levels of effort. This enables better training, prediction of adversary capabilities and imposing the maximum cost on threat actors.", + "description": "How \"hard\" is it to do a given ATT&CK technique? Are they all the same? Clearly Phishing is a lot easier than Hardware additions for initial access. How many ATT&CK techniques can be done within a budget of say $1000? Answering these questions is a powerful step towards knowing what kinds of threats you will face. Building on the ATT&CKcon 4.0 Lightning Talk \"Adjectives for ATT&CK\", this presentation continues the work of organizing offensive techniques into levels of effort. This enables better training, prediction of adversary capabilities and imposing the maximum cost on threat actors.", "video": "https://www.youtube.com/watch?v=03Ka4RM0LSM&list=PLLGRmm150VfA8ahybY6XdDGtbCkoBNyyn&index=25", "slides": "https://www.slideshare.net/slideshow/i-ll-take-att-ck-techniques-that-can-be-done-for-1000-alex-ben-langrill/273715590" }, @@ -1227,7 +1227,7 @@ "names": ["Brandon Levene"], "organization": "Google" }], - "description": "Opportunistically targeted ransomware deployments, aka Big Game Hunting (BGH), have caused a distinct disruption in the mechanics of monetizing crimeware compromises. This strategy has become the “end game” for the majority of organized cybercrime organizations, and one effect of this shift is the increased emphasis on enterprise-level targets. In this talk from the MITRE ATT&CKCon Power Hour session on October 9, 2020, Levene walks us through research about how a specific BGH threat actor pursues entry points, gains its foothold, pivots, and deploys payloads to maximize their financial gains with minimal effort - and infrastructure! You’ll walk away with an understanding of the latest BGH TTPs seen in enterprise environments, and how they map to the ATT&CK framework so you can build this research into your threat detection strategy and enhance your defenses.", + "description": "Opportunistically targeted ransomware deployments, aka Big Game Hunting (BGH), have caused a distinct disruption in the mechanics of monetizing crimeware compromises. This strategy has become the “end game” for the majority of organized cybercrime organizations, and one effect of this shift is the increased emphasis on enterprise-level targets. In this talk from the MITRE ATT&CKcon Power Hour session on October 9, 2020, Levene walks us through research about how a specific BGH threat actor pursues entry points, gains its foothold, pivots, and deploys payloads to maximize their financial gains with minimal effort - and infrastructure! You’ll walk away with an understanding of the latest BGH TTPs seen in enterprise environments, and how they map to the ATT&CK framework so you can build this research into your threat detection strategy and enhance your defenses.", "video": "https://www.youtube.com/watch?v=CNTAK54JxrI&list=PLkTApXQou_8KKl3fOIPKD_9pNpmSe1TKu&index=23", "slides": "https://www.slideshare.net/attackcon2018/ta505-a-study-of-high-end-big-game-hunting-in-2020" }, diff --git a/modules/resources/static_pages/attackcon.md b/modules/resources/static_pages/attackcon.md index 3b6cd1a055a..d50b08fc191 100644 --- a/modules/resources/static_pages/attackcon.md +++ b/modules/resources/static_pages/attackcon.md @@ -1,3 +1,3 @@ -Title: ATT&CKCon +Title: ATT&CKcon Template: resources/attackcon save_as: resources/attackcon/index.html \ No newline at end of file diff --git a/modules/resources/templates/attackcon-overview.html b/modules/resources/templates/attackcon-overview.html index 135bb546423..525c09252ce 100644 --- a/modules/resources/templates/attackcon-overview.html +++ b/modules/resources/templates/attackcon-overview.html @@ -25,7 +25,7 @@

{{ con.title }}

{% set ifSponsor = "sponsors_img_list" in con %} {% if "banner_img" in con %}

- ATT&CKCon Banner + ATT&CKcon Banner

{% endif %} diff --git a/modules/resources/templates/attackcon.html b/modules/resources/templates/attackcon.html index 0fea914da0c..bc64ca5beb2 100644 --- a/modules/resources/templates/attackcon.html +++ b/modules/resources/templates/attackcon.html @@ -12,12 +12,12 @@
-

ATT&CKCon

+

ATT&CKcon

At MITRE ATT&CK's annual conference, cybersecurity leaders and practitioners of all levels are