THE STATE OF MITRE ATT&CK® THREAT-INFORMED DEFENSE IN 2021
In a world of connecting the tactics, techniques, and procedures (TTP) of real adversaries to defensive countermeasures, have you ever wondered how the community is advancing towards a threat-informed defense with ATT&CK?
Join us for a panel discussion with ATT&CK subject matter experts as they reveal the results of a new industry report on the state of the application of ATT&CK in 2021. Our experts will:
- Explore the industry report themes and share use cases that focus on closing the gaps in cross-disciplinary application.
- Talk about who is benefitting from ATT&CK across the community, some common challenges users may face, and the impactful ways savvy practitioners are leveraging the framework.
- Give you a behind-the-scenes look at the new ATT&CK-focused program, aimed at forging a new breed of advantaged defenders.
MEET THE PANELISTS
Will Carlson | Director of Content, Cybrary
Will Carlson is the Director of Content at Cybrary. Will drives the strategy and vision for Cybrary’s content team, ensuring over 3 million learners have access to the most premier cybersecurity workforce development training catalog the industry has to offer. With over 15 years of IT and cybersecurity experience, Will brings a highly valuable skillset and expertise to the Cybrary team.
Andy Applebaum | Principal Cyber Security Engineer, MITRE
Andy Applebaum is a principal cybersecurity engineer at MITRE. He works on applied and theoretical security research problems, primarily in the realms of cyber defense, security automation, and automated adversary emulation. As a well-established researcher, he’s published many papers and spoken at multiple academic and industry conferences, including Black Hat Europe, SANS Security Operations Summit, BSides NOVA, and the FIRST Conference.
Jamie Williams is a Cyber Adversarial Engineer for the MITRE Corporation. He works on various exciting efforts involving security operations and research, specializing in adversary emulation and behavior-based detections. He also leads teams that help shape and deliver the “adversary-touch” within MITRE ATT&CK® and ATT&CK Evaluations.
Dr. Clem Skorupka is a Principal Cybersecurity Engineer at MITRE. His work has spanned both operations and research, focusing on improving the effectiveness of threat information in organizations. Throughout his career, he’s developed new techniques and technologies that enhance cybersecurity data collection, sharing, and application for the DoD, the IC, and, more recently, for civilian government sponsors. Dr. Skorupka is a co-author of NIST’s Special Publication 800-150 “Guide to Cyber Threat Information Sharing.”
Jackie Lasky is a Senior Cybersecurity Engineer and ATT&CK® Cyber Threat Intelligence Analyst for the MITRE Corporation. She’s been a member of the MITRE ATT&CK® team for three years and is currently involved in various efforts involving data analytics, machine learning, and CTI for ATT&CK®.
Amy Robertson is a Senior Cybersecurity Engineer for the MITRE corporation with over a decade of experience mitigating national security cyber risk. Amy provides cyber threat intelligence support to several mission spaces, including space assets and weapons systems. Before joining MITRE, Amy led the Department of Homeland Security’s NCCIC Strategic Communications team and supported international cyber collaboration and capacity-building programs across Europe and Central Asia. Amy’s experience extends into the private sector, where she managed cyber risk assessments and Cyber-OSINT & SOCMINT investigations for critical infrastructure portfolios.
Steve Luke is the Director of Content for MITRE ATT&CK Defender™. He’s dedicated to empowering organizations with more effective ways to robustly detect and respond to cyber-attacks. Since 2007, Steve has focused on delivering innovative solutions to cyber missions, with a special focus on ATT&CK® and its application to hunting. Steve co-authored a paper on TTP-Based Hunting, developed and delivered educational materials about that methodology, and leads purple teaming events to explore ATT&CK techniques and develop robust analytic approaches to detect them.
Steve earned a B.S. and Masters of Engineering in Electrical Engineering from Cornell University with a focus on digital signal processing. Prior to joining MITRE in 2005, he served as an officer in the United States Air Force.
How can I become a Certified ATT&CK® Defender?
In spring of 2021, MITRE’s own ATT&CK subject matter experts released a new online training and certification product, MITRE ATT&CK Defender™ (MAD). MAD is designed to close the cybersecurity skills gap by enabling defenders to gain the advantage over agile adversaries. MAD delivers knowledge, resources, skills and a family of credentials so the community can rapidly master the application of ATT&CK across disciplines.