
Attendees will understand Why Attack Trees provide a comprehensive framework for analyzing real-life threat activity threads which remains relevant to this day. This will be demonstrated by navigating the fundamental concepts of Attack Trees, emphasizing their relevance in contemporary cyber threat intelligence methodologies. By combining elements from MITRE ATT&CK, the Diamond Model of Intrusion, threat scenario research, and the attack tree methodology, the presenters demonstrate How the methodology enables cybersecurity professionals to collate threat actor activities and assess realistic defensive measures. From identifying sequential stages and nuanced tactics to visualizing attack chains, this exploration promises practical applications for daily use.
After the session, attendees will have a clear understanding of why they should adopt Attack Tree’s and how they can use them together with their own knowledge of the threat landscape, their organization’s threat surface, and their defender’s capability and resources.
View upcoming Summits:
SANS Cyber Threat Intelligence Summit 2025
Decoding cyber threats: A Practical Guide to using Attack Trees
Gert-Jan Bruggink, Founder & CEO, Venation
Sherman Chu, Cyber Threat Intelligence Lead, BlackRock