Parent directory/ | - | - |
5 Ways to Screw Up Your Security Program with ATT&CK.eng.srt | 88.9 KiB | 2019 Sep 30 17:52 |
5 Ways to Screw Up Your Security Program with ATT&CK.mp4 | 49.2 MiB | 2021 May 04 22:46 |
ATT&CK as a Teacher.eng.srt | 52.5 KiB | 2019 Sep 30 17:52 |
ATT&CK as a Teacher.mp4 | 19.8 MiB | 2021 May 04 22:46 |
Advancing Infosec, Keynote Presentation.eng.srt | 131.8 KiB | 2019 Sep 30 17:52 |
Advancing Infosec, Keynote Presentation.mp4 | 64.8 MiB | 2021 May 04 22:46 |
Agile Continuous Improvement Using ATT&CK.eng.srt | 85.5 KiB | 2019 Sep 30 17:52 |
Agile Continuous Improvement Using ATT&CK.mp4 | 36.5 MiB | 2021 May 04 22:46 |
All the Things.eng.srt | 73.4 KiB | 2019 Sep 30 17:52 |
All the Things.mp4 | 40.9 MiB | 2021 May 04 22:46 |
An ATT&CK Review of 200 Hybrid-Analysis Submissions.eng.srt | 33.6 KiB | 2019 Sep 30 17:52 |
An ATT&CK Review of 200 Hybrid-Analysis Submissions.mp4 | 22.1 MiB | 2021 May 04 22:46 |
Analyzing Targeted Intrusions Through the Lens of the ATT&CK Framework.eng.srt | 95.8 KiB | 2019 Sep 30 17:52 |
Analyzing Targeted Intrusions Through the Lens of the ATT&CK Framework.mp4 | 54.6 MiB | 2021 May 04 22:46 |
Building an Atomic Testing Program.eng.srt | 37.8 KiB | 2019 Sep 30 17:52 |
Building an Atomic Testing Program.mp4 | 19.1 MiB | 2021 May 04 22:46 |
Decision Analysis Applications in Threat Analysis Frameworks.eng.srt | 37.3 KiB | 2019 Sep 30 17:52 |
Decision Analysis Applications in Threat Analysis Frameworks.mp4 | 15.0 MiB | 2021 May 04 22:46 |
Detection Philosophy, Evolution & ATT&CK.eng.srt | 16.3 KiB | 2019 Sep 30 17:52 |
Detection Philosophy, Evolution & ATT&CK.mp4 | 8.8 MiB | 2021 May 04 22:46 |
End User Panel Discussion.eng.srt | 117.5 KiB | 2019 Sep 30 17:52 |
End User Panel Discussion.mp4 | 106.8 MiB | 2021 May 04 22:46 |
From Automation to Analytics.eng.srt | 90.6 KiB | 2019 Sep 30 17:52 |
From Automation to Analytics.mp4 | 50.1 MiB | 2021 May 04 22:46 |
From Red VS Blue to Red Loves Blue.eng.srt | 63.9 KiB | 2019 Sep 30 17:52 |
From Red VS Blue to Red Loves Blue.mp4 | 43.9 MiB | 2021 May 04 22:46 |
From Technique to Detection.eng.srt | 21.7 KiB | 2019 Sep 30 17:52 |
From Technique to Detection.mp4 | 11.7 MiB | 2021 May 04 22:46 |
Helping Your Non-Security Executives Understand ATT&CK in 10 Minutes or Less.eng.srt | 46.7 KiB | 2019 Sep 30 17:52 |
Helping Your Non-Security Executives Understand ATT&CK in 10 Minutes or Less.mp4 | 20.9 MiB | 2021 May 04 22:46 |
How Did We Get Here.eng.srt | 86.5 KiB | 2019 Sep 30 17:52 |
How Did We Get Here.mp4 | 64.5 MiB | 2021 May 04 22:46 |
Hunters ATT&CKing with the Data.eng.srt | 87.5 KiB | 2019 Sep 30 17:52 |
Hunters ATT&CKing with the Data.mp4 | 52.9 MiB | 2021 May 04 22:46 |
OSQuery = Love.eng.srt | 62.3 KiB | 2019 Sep 30 17:52 |
OSQuery = Love.mp4 | 25.5 MiB | 2021 May 04 22:46 |
Operationalizing ATT&CK.eng.srt | 15.9 KiB | 2019 Sep 30 17:52 |
Operationalizing ATT&CK.mp4 | 7.5 MiB | 2021 May 04 22:46 |
Playing Devil’s Advocate to Security Initiatives with ATT&CK.eng.srt | 89.1 KiB | 2019 Sep 30 17:52 |
Playing Devil’s Advocate to Security Initiatives with ATT&CK.mp4 | 41.6 MiB | 2021 May 04 22:46 |
Sofacy 2018 and the Adversary Playbook.eng.srt | 83.7 KiB | 2019 Sep 30 17:52 |
Sofacy 2018 and the Adversary Playbook.mp4 | 49.8 MiB | 2021 May 04 22:46 |
Summiting the Pyramid of Pain Operationalizing ATT&CK.eng.srt | 87.8 KiB | 2019 Sep 30 17:52 |
Summiting the Pyramid of Pain Operationalizing ATT&CK.mp4 | 40.9 MiB | 2021 May 04 22:46 |
The Use of Game Theory with MITRE ATT&CK.eng.srt | 13.3 KiB | 2019 Sep 30 17:52 |
The Use of Game Theory with MITRE ATT&CK.mp4 | 9.1 MiB | 2021 May 04 22:46 |
VCAF Expanding the ATT&CK Framework to cover VERIS Threat Action Varieties.eng.srt | 72.0 KiB | 2019 Sep 30 17:52 |
VCAF Expanding the ATT&CK Framework to cover VERIS Threat Action Varieties.mp4 | 43.4 MiB | 2021 May 04 22:46 |
Vendor Panel Discussion.eng.srt | 149.6 KiB | 2019 Sep 30 17:52 |
Vendor Panel Discussion.mp4 | 122.7 MiB | 2021 May 04 22:46 |