Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
14 changes: 7 additions & 7 deletions data/resources.json
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)",
"date": "January 2020",
"presenters": "Sarah Yoder and Jackie Lasky",
"url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it",
"slides": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it",
"description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)."
},
{
Expand Down Expand Up @@ -33,7 +33,7 @@
"name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense",
"date": "September 2019",
"presenters": "Adam Pennington",
"url": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense",
"slides": "https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-analysis-defense",
"description": "This presentation from the RH-ISAC Retail Cyber Intelligence Summit covers all four of the primary ATT&CK use cases, with a focus on detection and analytics, and assessments and engineering."
},
{
Expand Down Expand Up @@ -63,7 +63,7 @@
"name": "Finding Dependencies Between Adversary Techniques",
"date": "June 2019",
"presenters": "Andy Applebaum",
"url": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf",
"slides": "https://www.first.org/resources/papers/conf2019/1100-Applebaum.pdf",
"description": "This presentation from the Annual FIRST Conference presents different methods of using ATT&CK to find dependencies between adversary techniques to support defense."
},
{
Expand Down Expand Up @@ -101,7 +101,7 @@
"name": "Turning Intelligence into Action with MITRE ATT&CK",
"date": "March 2019",
"presenters": "Katie Nickels and Adam Pennington",
"url": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck",
"slides": "https://www.slideshare.net/KatieNickels/first-cti-symposium-turning-intelligence-into-action-with-mitre-attck",
"description": "This presentation from the FIRST CTI Symposium discusses how you can use ATT&CK for threat intelligence as well as biases to be aware of as you do that."
},
{
Expand Down Expand Up @@ -152,7 +152,7 @@
"name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK",
"date": "September 2018",
"presenters": "Katie Nickels and Cody Thomas",
"url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck",
"slides": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck",
"description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation."
},
{
Expand Down Expand Up @@ -204,7 +204,7 @@
"name": "Leveraging Campaigns to Untangle the Threat Group Ship of Theseus",
"date": "January 2023",
"presenters": "Adam Pennington",
"url": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus",
"slides": "https://www.slideshare.net/AdamPennington4/leveraging-campaigns-to-untangle-the-threat-group-ship-of-theseus",
"description": "This presentation introduces ATT&CK's newer categorization of Campaigns - a method of classification that more easily enables the tracking of the abilities and sophistication over time, in addition to enabling stakeholders to better identify potential targets based on industry"
},
{
Expand Down Expand Up @@ -260,7 +260,7 @@
"name": "Which Way is the Solar Wind Blowing - CloudSecNext Summit & Training 2021",
"date": "June 2021",
"presenters": "Jamie Williams and Blake Storm",
"url": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready",
"slides": "https://www.slideshare.net/JamieWilliams130/keynote-which-way-is-the-solarwind-blowing-techniques-are-changingare-you-ready",
"description": "This presentation provides a walkthrough of the SolarWinds attack at each stage of the attack, then shows how each of those steps correspond to portions of the ATT&CK Cloud framework"
},
{
Expand Down
23 changes: 14 additions & 9 deletions modules/benefactors/templates/benefactors.html
Original file line number Diff line number Diff line change
Expand Up @@ -222,15 +222,20 @@ <h4>Supporters</h4>
url: "https://www.nab.com.au",
title: "National Australia Bank"
},
{
logo: "/theme/images/benefactors/siemens.png",
url: "https://www.siemens.com/global/en/company/about.html",
title: "Siemens AG"
{
logo: "/theme/images/benefactors/secpod.png",
url: "https://www.secpod.com",
title: "SecPod"
}
],
},
{
sponsors: [
{
logo: "/theme/images/benefactors/siemens.png",
url: "https://www.siemens.com/global/en/company/about.html",
title: "Siemens AG"
},
{
logo: "/theme/images/benefactors/SOC-prime-logo.png",
url: "https://socprime.com",
Expand All @@ -245,16 +250,16 @@ <h4>Supporters</h4>
logo: "/theme/images/benefactors/standard_chartered.png",
url: "https://www.sc.com/en/",
title: "Standard Chartered"
},
{
logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png",
url: "https://www.tidalcyber.com",
title: "Tidal Cyber"
}
],
},
{
sponsors: [
{
logo: "/theme/images/benefactors/Tidal-Stacked-Hero.png",
url: "https://www.tidalcyber.com",
title: "Tidal Cyber"
},
{
logo: "/theme/images/benefactors/ZIMPERIUM-logo_blackBG.png",
url: "https://www.zimperium.com",
Expand Down
4 changes: 3 additions & 1 deletion modules/resources/templates/presentation-archive.html
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,7 @@ <h6 class="presentation-count"></h6>
</div>
<p></p>
<div class="material">
{% if "url" in presentation %}
<a href="{{ presentation.url }}">
<button type="button" class="slide-button">
<span class="slide-button-text">
Expand All @@ -94,8 +95,9 @@ <h6 class="presentation-count"></h6>
</span>
</button>
</a>
{% endif %}
{% if "slides" in presentation %}
<a class="my-2 ml-2" href="{{ presentation.slides }}">
<a class="my-2 {% if 'url' in presentation %}ml-2{% endif %}" href="{{ presentation.slides }}">
<button type="button" class="slide-button slide-button-secondary">
<span class="slide-button-text">
<span>
Expand Down
Loading