Decoding cyber threats: A Practical Guide to using Attack Trees

Просмотров: 774   |   Загружено: 4 мес.
icon
SANS Digital Forensics and Incident Response
icon
7
icon
Скачать
iconПодробнее о видео
Acknowledging a systematic and time-tested methodology dating back to 1982, this session explores the intricate method of "Attack Trees". To this day it still offers a powerful holistic approach to modeling cyber security threats and their sequential actions against assets. In addition, being a powerful tool both for visualizing complex attack sequences to business leaders and effective stakeholder engagement.

Attendees will understand Why Attack Trees provide a comprehensive framework for analyzing real-life threat activity threads which remains relevant to this day. This will be demonstrated by navigating the fundamental concepts of Attack Trees, emphasizing their relevance in contemporary cyber threat intelligence methodologies. By combining elements from MITRE ATT&CK, the Diamond Model of Intrusion, threat scenario research, and the attack tree methodology, the presenters demonstrate How the methodology enables cybersecurity professionals to collate threat actor activities and assess realistic defensive measures. From identifying sequential stages and nuanced tactics to visualizing attack chains, this exploration promises practical applications for daily use.

After the session, attendees will have a clear understanding of why they should adopt Attack Tree’s and how they can use them together with their own knowledge of the threat landscape, their organization’s threat surface, and their defender’s capability and resources.
View upcoming Summits:

SANS Cyber Threat Intelligence Summit 2025
Decoding cyber threats: A Practical Guide to using Attack Trees
Gert-Jan Bruggink, Founder & CEO, Venation
Sherman Chu, Cyber Threat Intelligence Lead, BlackRock

Похожие видео

Добавлено: 55 год.
Добавил:
  © 2019-2021
  Decoding cyber threats: A Practical Guide to using Attack Trees - RusLar.Me