
March 2023
Wednesday, March 22nd
8am PT | 11am ET | 3pm GMT
Save your spot
About The Event
Join the virtual event to learn how Uncovering Attack Patterns to Better Defend Your Organization: Eliminate Weak Points in Your Threat Defenses from MITRE Engenuity and Anomali. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.
Featuring
Jon Baker
Director, MITRE Engenuity Center for Threat-Informed Defense
Mark Alba
Chief Product Officer, Anomali
Cindy Goodwin-Sak
Vice President, Global Sales Engineering, Anomali
Rajiv Raghunarayan
Senior Vice President, Product Marketing, Anomali
Who Should Attend
This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their environments.
Agenda
8:00am PT | Rajiv Raghunarayan, Anomali | Opening |
8:05am PT | Jon Baker, MITRE Engenuity | Mark Alba, Anomali | Cindy Goodwin-Sak, Anomali | Rajiv Raghunarayan, Anomali | Attack Flow Project: Collaborative R&D that’s Changing the Game |
8:15am PT | Mark Alba, Anomali | Mapping Attack Patterns to Detect Threats |
9:00am PT | Cindy Goodwin-Sak, Anomali | Demo |
9:10am PT | Jon Baker, MITRE Engenuity Center for Threat-Informed Defense | Attack Flow: Laying the Foundation for Predictive Intelligence |
9:55am PT | Rajiv Raghunarayan, Anomali | Closing |
Sessions
Attack Flow Project: Collaborative R&D that’s Changing the GameJon Baker, MITRE Engenuity | Mark Alba, Anomali | Cindy Goodwin-Sak, Anomali | Rajiv Raghunarayan, AnomaliA Q&A discussion with Mark Alba, Chief Product Officer, Anomali, Cindy Goodwin-Sak, Anomali and Jon Baker, Director, MITRE Engenuity Center for Threat-Informed Defense, moderated by Rajiv Raghunarayan, Senior Vice President of Product Marketing, Anomali. We’ll discuss the evolution of the Center for Threat-Informed Defense and the Attack Flow Project, Anomali’s role in the project, and provide a use case. |
Mapping Attack Patterns to Detect ThreatsMark Alba, Anomali | Cindy Goodwin-Sak, AnomaliTo move forward, we often reflect on the past. It’s no different in cybersecurity. Take, for instance, threat detection. In the early days of the internet, recognition entailed when a “threat” indicated a payload embedded with an indiscriminate worm that produced an irritating message or an awkward gif. As threats increased in intricacy, so did detection capabilities. Starting with event monitoring, which necessitated analysts to sift through the noise for evidence that could potentially lead to the attacker. A new approach to detecting threats is rising, one that leverages advancements to find threats by incessantly tracking the bad guys and their patterns, providing real-time visibility into risk – including before and after an attack. |
Attack Flow: Laying the Foundation for Predictive IntelligenceJon Baker, Director, MITRE Engenuity Center for Threat-Informed DefenseAs a community, we can realize the dream of predictive intel. Learning from past incidents enables us to accelerate threat hunting. Using events correlated to MITRE ATT&CK® helps intel teams with attribution. We have created the puzzle pieces through the Center for Threat-Informed Defense’s R&D program. Now it’s time to assemble them as a community and truly enable predictive intelligence. |
Earn CPE Credits
Are you a certified CISSP? You can earn up to 1.75 CPE credit for attending this event. Instructions for claiming your CPE will be sent over email following the conclusion of the event.