Generating MITRE ATT&CK DNA for Groups of Actors
Offered By: Cooper via YouTube
Course Description
Overview
Explore the concept of generating MITRE ATT&CK DNA for groups of actors in this informative 36-minute conference talk by Sergey Polzunov from Cooper. Delve into the hypothesis, algorithm, and hitmap behind this approach, and learn about term frequency analysis. Examine use cases, including threat actor groups emulating each other, and discuss challenges faced in the process. Discover available resources, the potential for a centralized repository, and ways the community can contribute. Gain insights into the application of natural language processing in this field, with a specific focus on China-related threat actors.
Syllabus
Introduction
Hypothesis
Algorithm
Hitmap
Term Frequency
Disclaimer
China
Use cases
Threat actor groups emulating each other
What are the challenges
What resources are available
Is there a centralized repository
How can the community help
Natural language processing
Taught by
Cooper
Related Courses
Ethical Hacking: Introduction to Ethical HackingLinkedIn Learning Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight Intro to Purple Team - Cyber Threat Intelligence, Attack, Detect, Respond
RSA Conference via YouTube Lessons from Applying MITRE ATT&CK in the Wild
RSA Conference via YouTube Atomic Threat Coverage - Being Threat Centric
BruCON Security Conference via YouTube