The Opportunity of Defeating the Enemy Is Provided By the Enemy Himself. – Sun Tzu, The Art of War
Tuesday, August 23, 2022
8am PT | 11am ET | 4pm BST
Tracking adversary behaviors is key to adopting a threat-informed defense. While most defenders commonly track adversary behaviors, they often do it individually, focusing on one specific action at a time. This approach only focuses on one step, as adversaries use sequences of techniques to achieve their goals. Understanding the context within those sequences makes defenders better prepared and more effective.
Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities.
Join the session to hear more about:
- MITRE Engenuity’s Center for Threat-Informed Defense and the Attack Flow Project, of which Anomali is a proud participant
- Why MITRE ATT&CK is becoming the defacto framework used by security analysts
- How the Attack Flow Project and Anomali’s solutions use MITRE ATT&CK® to describe specific adversary behaviors.
Register today to learn more about how attack flow patterns can help you better understand your adversary to effectively defend against them.
Chris Steffen, Managing Research Director, Enterprise Management Associates
Jon Baker, Director and Co-Founder, Center for Threat-Informed Defense
Mark Alba, Chief Product Officer, Anomali
Joe Ariganello, VP Product Marketing, Anomali