Time
                                    10:15 AM - 10:35 AM (PDT)
                                        Name
                                    Level Up Threat Intel with Attack Flow
                                        Description
                                    Describing adversary behavior using the ATT&CK knowledge base is a cornerstone of the threat-informed defense paradigm, but techniques rarely occur in isolation. Instead, the attacker uses each technique to pave the way for additional techniques they can deploy as they pursue their ultimate objectives. Learn how Attack Flow models these sequences of ATT&CK techniques to make threat intelligence more powerful and visual.
Speakers
                                    
                                        Session Survey