The Opportunity of Defeating the Enemy Is Provided By the Enemy Himself. – Sun Tzu, The Art of War
Tracking adversary behaviors is key to adopting a threat-informed defense. While most defenders commonly track adversary behaviors, they often do it individually, focusing on one specific action at a time. This approach only focuses on one step, as adversaries use sequences of behaviors to achieve their goals. Understanding the context within those sequences makes defenders better prepared and more effective.
Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities.
Watch the on-demand webinar to hear more about:
- MITRE Engenuity’s Center for Threat-Informed Defense and the Attack Flow Project, of which Anomali is a proud participant
- Why MITRE ATT&CK is becoming the de facto framework used by security analysts
- How the Attack Flow Project and Anomali’s solutions use MITRE ATT&CK® to describe specific adversary behaviors.
Learn more about how Attack Flow patterns can help you better understand your adversary to effectively defend against them.
Chris Steffen, Managing Research Director, Enterprise Management Associates
Jon Baker, Director and Co-Founder, Center for Threat-Informed Defense
Mark Alba, Chief Product Officer, Anomali
Chris Needs, VP Product Management, Anomali