diff --git a/attack-theme/static/images/benefactors/secpod.png b/attack-theme/static/images/benefactors/secpod.png new file mode 100644 index 00000000000..16e9fade5e5 Binary files /dev/null and b/attack-theme/static/images/benefactors/secpod.png differ diff --git a/data/resources.json b/data/resources.json index e36fa4320ed..2a6814a1389 100644 --- a/data/resources.json +++ b/data/resources.json @@ -4,7 +4,7 @@ "name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)", "date": "January 2020", "presenters": "Sarah Yoder and Jackie Lasky", - "url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", + "slides": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it", "description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)." }, { @@ -33,7 +33,7 @@ "name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense", "date": "September 2019", "presenters": "Adam Pennington", - "url": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", + "slides": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense", "description": "This presentation from the RH-ISAC Retail Cyber Intelligence Summit covers all four of the primary ATT&CK use cases, with a focus on detection and analytics, and assessments and engineering." }, { @@ -63,7 +63,7 @@ "name": "Finding Dependencies Between Adversary Techniques", "date": "June 2019", "presenters": "Andy Applebaum", - "url": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", + "slides": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf", "description": "This presentation from the Annual FIRST Conference presents different methods of using ATT&CK to find dependencies between adversary techniques to support defense." }, { @@ -101,7 +101,7 @@ "name": "Turning Intelligence into Action with MITRE ATT&CK", "date": "March 2019", "presenters": "Katie Nickels and Adam Pennington", - "url": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", + "slides": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck", "description": "This presentation from the FIRST CTI Symposium discusses how you can use ATT&CK for threat intelligence as well as biases to be aware of as you do that." }, { @@ -152,7 +152,7 @@ "name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK", "date": "September 2018", "presenters": "Katie Nickels and Cody Thomas", - "url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", + "slides": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck", "description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation." }, { @@ -204,7 +204,7 @@ "name": "Leveraging Campaigns to Untangle the Threat Group Ship of Theseus", "date": "January 2023", "presenters": "Adam Pennington", - "url": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", + "slides": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus", "description": "This presentation introduces ATT&CK's newer categorization of Campaigns - a method of classification that more easily enables the tracking of the abilities and sophistication over time, in addition to enabling stakeholders to better identify potential targets based on industry" }, { @@ -260,7 +260,7 @@ "name": "Which Way is the Solar Wind Blowing - CloudSecNext Summit & Training 2021", "date": "June 2021", "presenters": "Jamie Williams and Blake Storm", - "url": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", + "slides": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready", "description": "This presentation provides a walkthrough of the SolarWinds attack at each stage of the attack, then shows how each of those steps correspond to portions of the ATT&CK Cloud framework" }, { diff --git a/modules/benefactors/templates/benefactors.html b/modules/benefactors/templates/benefactors.html index 435b06ed051..25ca1fab334 100644 --- a/modules/benefactors/templates/benefactors.html +++ b/modules/benefactors/templates/benefactors.html @@ -222,15 +222,20 @@

Supporters

url: "https://www.nab.com.au", title: "National Australia Bank" }, - { - logo: "/theme/images/benefactors/siemens.png", - url: "https://www.siemens.com/global/en/company/about.html", - title: "Siemens AG" + { + logo: "/theme/images/benefactors/secpod.png", + url: "https://www.secpod.com", + title: "SecPod" } ], }, { sponsors: [ + { + logo: "/theme/images/benefactors/siemens.png", + url: "https://www.siemens.com/global/en/company/about.html", + title: "Siemens AG" + }, { logo: "/theme/images/benefactors/SOC-prime-logo.png", url: "https://socprime.com", @@ -245,16 +250,16 @@

Supporters

logo: "/theme/images/benefactors/standard_chartered.png", url: "https://www.sc.com/en/", title: "Standard Chartered" - }, - { - logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png", - url: "https://www.tidalcyber.com", - title: "Tidal Cyber" } ], }, { sponsors: [ + { + logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png", + url: "https://www.tidalcyber.com", + title: "Tidal Cyber" + }, { logo: "/theme/images/benefactors/ZIMPERIUM-logo_blackBG.png", url: "https://www.zimperium.com", diff --git a/modules/resources/templates/presentation-archive.html b/modules/resources/templates/presentation-archive.html index c5f14b1735b..7b40ed284d8 100644 --- a/modules/resources/templates/presentation-archive.html +++ b/modules/resources/templates/presentation-archive.html @@ -82,6 +82,7 @@

+ {% if "url" in presentation %} + {% endif %} {% if "slides" in presentation %} - +