ATT&CKcon/ATT&CK logo.png |
28 KB |
ATT&CKcon/ATT&CK thank you.txt |
1 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 5 Ways to Screw Up Your Security Program with ATT&CK.en.transcribed.srt |
89 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 5 Ways to Screw Up Your Security Program with ATT&CK.mp4 |
46.1 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK All the Things.en.transcribed.srt |
73 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK All the Things.mp4 |
39.6 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK + OSQuery = Love.en.transcribed.srt |
62 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK + OSQuery = Love.mp4 |
28.3 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK as a Teacher.en.transcribed.srt |
53 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 ATT&CK as a Teacher.mp4 |
19.1 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Advancing Infosec, Keynote Presentation.en.transcribed.srt |
132 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Advancing Infosec, Keynote Presentation.mp4 |
59.8 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Agile Continuous Improvement Using ATT&CK.en.transcribed.srt |
86 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Agile Continuous Improvement Using ATT&CK.mp4 |
36.8 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 An ATT&CK Review of 200 Hybrid-Analysis Submissions.en.transcribed.srt |
34 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 An ATT&CK Review of 200 Hybrid-Analysis Submissions.mp4 |
20.3 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Analyzing Targeted Intrusions Through the Lens of the ATT&CK Framework.en.transcribed.srt |
96 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Analyzing Targeted Intrusions Through the Lens of the ATT&CK Framework.mp4 |
45 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Building an Atomic Testing Program.en.transcribed.srt |
38 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Building an Atomic Testing Program.mp4 |
17.1 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Decision Analysis Applications in Threat Analysis Frameworks.en.transcribed.srt |
37 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Decision Analysis Applications in Threat Analysis Frameworks.mp4 |
17.7 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Detection Philosophy, Evolution & ATT&CK.en.transcribed.srt |
16 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Detection Philosophy, Evolution & ATT&CK.mp4 |
9.3 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 End User Panel Discussion.en.transcribed.srt |
118 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 End User Panel Discussion.mp4 |
91 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Automation to Analytics.en.transcribed.srt |
91 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Automation to Analytics.mp4 |
41.7 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Red VS Blue to Red Loves Blue.en.transcribed.srt |
64 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Red VS Blue to Red Loves Blue.mp4 |
41 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Technique to Detection.en.transcribed.srt |
22 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 From Technique to Detection.mp4 |
11.6 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Helping Your Non-Security Executives Understand ATT&CK in 10 Minutes or Less.en.transcribed.srt |
47 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Helping Your Non-Security Executives Understand ATT&CK in 10 Minutes or Less.mp4 |
21.6 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 How Did We Get Here.en.transcribed.srt |
86 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 How Did We Get Here.mp4 |
72.1 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Hunters ATT&CKing with the Data.en.transcribed.srt |
88 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Hunters ATT&CKing with the Data.mp4 |
46.5 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Operationalizing ATT&CK.en.transcribed.srt |
16 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Operationalizing ATT&CK.mp4 |
8.8 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Playing Devil’s Advocate to Security Initiatives with ATT&CK.en.transcribed.srt |
89 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Playing Devil’s Advocate to Security Initiatives with ATT&CK.mp4 |
37.5 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Sofacy 2018 and the Adversary Playbook.en.transcribed.srt |
84 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Sofacy 2018 and the Adversary Playbook.mp4 |
44.9 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Summiting the Pyramid of Pain Operationalizing ATT&CK.en.transcribed.srt |
88 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Summiting the Pyramid of Pain Operationalizing ATT&CK.mp4 |
36.2 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 The Use of Game Theory with MITRE ATT&CK.en.transcribed.srt |
13 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 The Use of Game Theory with MITRE ATT&CK.mp4 |
10 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 VCAF Expanding the ATT&CK Framework to cover VERIS Threat Action Varieties.en.transcribed.srt |
72 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 VCAF Expanding the ATT&CK Framework to cover VERIS Threat Action Varieties.mp4 |
38.1 MB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Vendor Panel Discussion.en.transcribed.srt |
150 KB |
ATT&CKcon/ATT&CKcon 2018/MITRE ATT&CKcon 2018 Vendor Panel Discussion.mp4 |
115.5 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - Day 1 Highlights.en.srt |
2 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - Day 1 Highlights.mp4 |
7.6 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - Keynote Address - The Friends We Made Along the Way.en.srt |
71 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - Keynote Address - The Friends We Made Along the Way.mp4 |
146.6 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - The ATT&CKcon Couch (highlights).en.srt |
5 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 - The ATT&CKcon Couch (highlights).mp4 |
11.3 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 AMITT ATT&CK-based Standards for Misinformation Threat Sharing.en.srt |
43 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 AMITT ATT&CK-based Standards for Misinformation Threat Sharing.mp4 |
94.8 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - CAR and Analytics.en.srt |
25 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - CAR and Analytics.mp4 |
50.5 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - Controls Mapping.en.srt |
26 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - Controls Mapping.mp4 |
48.9 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - ICS.en.srt |
22 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - ICS.mp4 |
54.2 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - Sightings.en.srt |
30 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - Sightings.mp4 |
50.8 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - TRAM.en.srt |
25 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 ATT&CK Updates - TRAM.mp4 |
55 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Alertable Techniques for Linux Using ATT&CK.en.srt |
47 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Alertable Techniques for Linux Using ATT&CK.mp4 |
99.5 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Closing Remarks.en.srt |
31 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Closing Remarks.mp4 |
63 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Flashback with ATT&CK - Exploring Malware History with ATT&CK (2003-2018).en.transcribed.srt |
21 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Flashback with ATT&CK - Exploring Malware History with ATT&CK (2003-2018).mp4 |
51.9 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 From Susceptible to ATT&CK A Threat Hunting Story.en.transcribed.srt |
43 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 From Susceptible to ATT&CK A Threat Hunting Story.mp4 |
94.3 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 How a Threat Hunting Team Has Upgraded Its Use of ATT&CK.en.srt |
58 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 How a Threat Hunting Team Has Upgraded Its Use of ATT&CK.mp4 |
122.3 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Lessons in Purple Teaming with ATT&CK.en.transcribed.srt |
53 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Lessons in Purple Teaming with ATT&CK.mp4 |
102 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Lightning Talks.en.srt |
73 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Lightning Talks.mp4 |
158.9 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 MITRE ATT&CK Assessment from a Data Perspective.en.srt |
22 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 MITRE ATT&CK Assessment from a Data Perspective.mp4 |
44.5 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 MITRE Executive Welcome.en.srt |
8 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 MITRE Executive Welcome.mp4 |
18.9 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 PRE-ATT&CK Integration.en.srt |
13 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 PRE-ATT&CK Integration.mp4 |
30 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Prioritizing ATT&CK Informed Defenses the CIS Way.en.srt |
42 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Prioritizing ATT&CK Informed Defenses the CIS Way.mp4 |
96.8 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Prioritizing Data Sources for Minimum Viable Detection.en.srt |
50 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Prioritizing Data Sources for Minimum Viable Detection.mp4 |
112.7 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Raiders of the MITRE Framework How to Build Your Own Threat Library.en.transcribed.srt |
42 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Raiders of the MITRE Framework How to Build Your Own Threat Library.mp4 |
98.1 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Ready to ATT&CK Bring Your Own Data (BYOD) and Validate Your Data Analytics!.en.srt |
53 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Ready to ATT&CK Bring Your Own Data (BYOD) and Validate Your Data Analytics!.mp4 |
98 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 State of the ATT&CK.en.srt |
51 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 State of the ATT&CK.mp4 |
99.8 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Tell Tall Tales with ATT&CK!.en.transcribed.srt |
21 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Tell Tall Tales with ATT&CK!.mp4 |
51.8 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 The World's Most Dangerous ATT&CKers.en.srt |
20 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 The World's Most Dangerous ATT&CKers.mp4 |
50 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Threat-Informed Defense Where do we go from here.en.srt |
23 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Threat-Informed Defense Where do we go from here.mp4 |
60.6 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Using Threat Intelligence to Focus ATT&CK Activities.en.srt |
53 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Using Threat Intelligence to Focus ATT&CK Activities.mp4 |
105.9 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Welcome.en.srt |
21 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Welcome.mp4 |
43.6 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Zeek-based ATT&CK Metrics & Gap Analysis.en.srt |
24 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 Zeek-based ATT&CK Metrics & Gap Analysis.mp4 |
50.2 MB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 attckr Toolkit of ATT&CK Incident Data for Service Providers & Organizations.en.srt |
31 KB |
ATT&CKcon/ATT&CKcon 2019/MITRE ATT&CKcon 2.0 attckr Toolkit of ATT&CK Incident Data for Service Providers & Organizations.mp4 |
47.9 MB |