<!-- START: Parmonic embed for video --> <h2 class="parmonic-widget" data-layout="trailer-timeline" data-v-id="trailer/21e0b5ce7fd994a3">The Opportunity of Defeating the Enemy Is Provided By the Enemy Himself. – Sun Tzu, <em>The Art of War</em></h2> <p>Tracking adversary behaviors is key to adopting a threat-informed defense. While most defenders commonly track adversary behaviors, they often do it individually, focusing on one specific action at a time. This approach only focuses on one step, as adversaries use sequences of behaviors to achieve their goals. Understanding the context within those sequences makes defenders better prepared and more effective.</p> <p><iframe allow="fullscreen" src="https://parmonic.ai/anomali/trailer/d4a3a6e355aca1b9/iframe" style="width: 100%; aspect-ratio: 16/9; border: 0;" title="Trailer - MITRE and Anomali"></iframe></p> <p>Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities.</p> <p>Watch the on-demand webinar to hear more about:</p> <ul> <li>MITRE Engenuity’s Center for Threat-Informed Defense and the Attack Flow Project, of which Anomali is a proud participant</li> <li>Why MITRE ATT&CK is becoming the de facto framework used by security analysts</li> <li>How the Attack Flow Project and Anomali’s solutions use MITRE ATT&CK® to describe specific adversary behaviors.</li> </ul> <p>Learn more about how Attack Flow patterns can help you better understand your adversary to effectively defend against them.</p> <h3>Speakers</h3> <p>Chris Steffen, Managing Research Director, Enterprise Management Associates</p> <p>Jon Baker, Director and Co-Founder, Center for Threat-Informed Defense</p> <p>Mark Alba, Chief Product Officer, Anomali</p> <p>Chris Needs, VP Product Management, Anomali</p>
No items found.