9:40 AM - 10:25 AM (PDT)
Level Up Threat Intel with Attack Flow

Describing adversary behavior using the ATT&CK knowledge base is a cornerstone of the threat-informed defense paradigm, but techniques rarely occur in isolation. Instead, the attacker uses each technique to pave the way for additional techniques they can deploy as they pursue their ultimate objectives. Learn how Attack Flow models these sequences of ATT&CK techniques to make threat intelligence more powerful and visual.

Session Survey