diff --git a/attack-theme/static/images/benefactors/secpod.png b/attack-theme/static/images/benefactors/secpod.png new file mode 100644 index 00000000000..16e9fade5e5 Binary files /dev/null and b/attack-theme/static/images/benefactors/secpod.png differ diff --git a/data/resources.json b/data/resources.json index e36fa4320ed..2a6814a1389 100644 --- a/data/resources.json +++ b/data/resources.json @@ -4,7 +4,7 @@ "name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)", "date": "January 2020", "presenters": "Sarah Yoder and Jackie Lasky", - "url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", + "slides": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", "description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)." }, { @@ -33,7 +33,7 @@ "name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense", "date": "September 2019", "presenters": "Adam Pennington", - "url": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", + "slides": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", "description": "This presentation from the RH-ISAC Retail Cyber Intelligence Summit covers all four of the primary ATT&CK use cases, with a focus on detection and analytics, and assessments and engineering." }, { @@ -63,7 +63,7 @@ "name": "Finding Dependencies Between Adversary Techniques", "date": "June 2019", "presenters": "Andy Applebaum", - "url": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", + "slides": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", "description": "This presentation from the Annual FIRST Conference presents different methods of using ATT&CK to find dependencies between adversary techniques to support defense." }, { @@ -101,7 +101,7 @@ "name": "Turning Intelligence into Action with MITRE ATT&CK", "date": "March 2019", "presenters": "Katie Nickels and Adam Pennington", - "url": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", + "slides": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", "description": "This presentation from the FIRST CTI Symposium discusses how you can use ATT&CK for threat intelligence as well as biases to be aware of as you do that." }, { @@ -152,7 +152,7 @@ "name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK", "date": "September 2018", "presenters": "Katie Nickels and Cody Thomas", - "url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", + "slides": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", "description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation." }, { @@ -204,7 +204,7 @@ "name": "Leveraging Campaigns to Untangle the Threat Group Ship of Theseus", "date": "January 2023", "presenters": "Adam Pennington", - "url": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", + "slides": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", "description": "This presentation introduces ATT&CK's newer categorization of Campaigns - a method of classification that more easily enables the tracking of the abilities and sophistication over time, in addition to enabling stakeholders to better identify potential targets based on industry" }, { @@ -260,7 +260,7 @@ "name": "Which Way is the Solar Wind Blowing - CloudSecNext Summit & Training 2021", "date": "June 2021", "presenters": "Jamie Williams and Blake Storm", - "url": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", + "slides": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", "description": "This presentation provides a walkthrough of the SolarWinds attack at each stage of the attack, then shows how each of those steps correspond to portions of the ATT&CK Cloud framework" }, { diff --git a/modules/benefactors/templates/benefactors.html b/modules/benefactors/templates/benefactors.html index 435b06ed051..25ca1fab334 100644 --- a/modules/benefactors/templates/benefactors.html +++ b/modules/benefactors/templates/benefactors.html @@ -222,15 +222,20 @@