diff --git a/data/attackcon.json b/data/attackcon.json index ce4c6841f6e..38f54f6f294 100644 --- a/data/attackcon.json +++ b/data/attackcon.json @@ -341,6 +341,7 @@ } ], "description": "", + "video": "https://mitre.brandlive.com/ATTACKCon-4-0/en/session/37f1382e-9473-11ee-92f3-b34fc23cb3e6", "slides": "https://www.slideshare.net/MITREATTACK/the-case-for-quishing" }, { @@ -352,6 +353,7 @@ } ], "description": "Capital One is currently building a Security Graph to tie together various Cyber Teams and their data -- Controls, Objectives, Tools, and Countermeasures, Threats. It is an ambitious project that will help us identify gaps and focus our controls on the most likely and persistent threats. It is a work in progress that is using MITRE ATT&CK and D3FEND as a \"lingua franca\" to tie together the elements of the graph, so we have a common understanding across the enterprise.", + "video": "https://mitre.brandlive.com/ATTACKCon-4-0/en/session/37f1382e-9473-11ee-92f3-b34fc23cb3e6", "slides": "https://www.slideshare.net/MITREATTACK/discussion-on-finding-relationships-in-cyber-data" }, { @@ -363,6 +365,7 @@ } ], "description": "If you tell me an attacker performed OS Credential Dumping, did they dump credentials with meterpreter, recompile mimikatz, or use a custom tool? The technique reference lacks a way to categorize how they performed the action and each type requires its own mitigation. In this talk, Ben Langirll will propose formal adjectives for ATT&CK techniques that map to adversary capabilities and how we can use them to optimize defensive choices.", + "video": "https://mitre.brandlive.com/ATTACKCon-4-0/en/session/37f1382e-9473-11ee-92f3-b34fc23cb3e6", "slides": "https://www.slideshare.net/MITREATTACK/adjectives-for-attck" }, { @@ -374,6 +377,7 @@ } ], "description": "This presentation will briefly summarize work that we've done regarding implementing the ATT&CK framework as a rule-fact-action network within a Blackboard Architecture, allowing the ATT&CK framework to enable security testing automation. The presentation will start with a quick summary of the concept behind this and then present a few implementation examples.", + "video": "https://mitre.brandlive.com/ATTACKCon-4-0/en/session/37f1382e-9473-11ee-92f3-b34fc23cb3e6", "slides": "https://www.slideshare.net/MITREATTACK/automating-testing-by-implementing-attck-using-the-blackboard-architecture" } ]