Detect LIVE March 2023 | Anomali

Anomali Detect LIVE
March 2023

Wednesday, March 22nd
8am PT | 11am ET | 3pm GMT

Save your spot

About The Event

Join the virtual event to learn how Uncovering Attack Patterns to Better Defend Your Organization: Eliminate Weak Points in Your Threat Defenses from MITRE Engenuity and Anomali. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.

Featuring

Jon Baker
Director, MITRE Engenuity Center for Threat-Informed Defense

Mark Alba
Chief Product Officer, Anomali

Cindy Goodwin-Sak
Vice President, Global Sales Engineering, Anomali

Rajiv Raghunarayan
Senior Vice President, Product Marketing, Anomali

Who Should Attend

This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their environments.

Agenda

8:00am PTRajiv Raghunarayan, AnomaliOpening
8:05am PTJon Baker, MITRE Engenuity | Mark Alba, Anomali | Cindy Goodwin-Sak, Anomali | Rajiv Raghunarayan, AnomaliAttack Flow Project: Collaborative R&D that’s Changing the Game
8:15am PTMark Alba, AnomaliMapping Attack Patterns to Detect Threats
9:00am PTCindy Goodwin-Sak, AnomaliDemo
9:10am PTJon Baker, MITRE Engenuity Center for Threat-Informed DefenseAttack Flow: Laying the Foundation for Predictive Intelligence
9:55am PTRajiv Raghunarayan, AnomaliClosing

Sessions

Attack Flow Project: Collaborative R&D that’s Changing the Game

Jon Baker, MITRE Engenuity | Mark Alba, Anomali | Cindy Goodwin-Sak, Anomali | Rajiv Raghunarayan, Anomali

A Q&A discussion with Mark Alba, Chief Product Officer, Anomali, Cindy Goodwin-Sak, Anomali and Jon Baker, Director, MITRE Engenuity Center for Threat-Informed Defense, moderated by Rajiv Raghunarayan, Senior Vice President of Product Marketing, Anomali. We’ll discuss the evolution of the Center for Threat-Informed Defense and the Attack Flow Project, Anomali’s role in the project, and provide a use case.

Mapping Attack Patterns to Detect Threats

Mark Alba, Anomali | Cindy Goodwin-Sak, Anomali

To move forward, we often reflect on the past. It’s no different in cybersecurity.  Take, for instance, threat detection. In the early days of the internet, recognition entailed when a “threat” indicated a payload embedded with an indiscriminate worm that produced an irritating message or an awkward gif. 

As threats increased in intricacy, so did detection capabilities. Starting with event monitoring, which necessitated analysts to sift through the noise for evidence that could potentially lead to the attacker. 

A new approach to detecting threats is rising, one that leverages advancements to find threats by incessantly tracking the bad guys and their patterns, providing real-time visibility into risk – including before and after an attack.

Attack Flow: Laying the Foundation for Predictive Intelligence

Jon Baker, Director, MITRE Engenuity Center for Threat-Informed Defense

As a community, we can realize the dream of predictive intel. Learning from past incidents enables us to accelerate threat hunting. Using events correlated to MITRE ATT&CK® helps intel teams with attribution. We have created the puzzle pieces through the Center for Threat-Informed Defense’s R&D program. Now it’s time to assemble them as a community and truly enable predictive intelligence.

Earn CPE Credits

Are you a certified CISSP? You can earn up to 1.75 CPE credit for attending this event. Instructions for claiming your CPE will be sent over email following the conclusion of the event.

Speakers

  • MITRE Engenuity
  • Anomali