meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

The current state of MITRE ATT&CK.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 15 July 2024

⏱️ 18 minutes

🧾️ Download transcript

Summary

Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene’s VP of Information Security. References: Amy L. Robertson, 2024. ATT&CK 2024 Roadmap [Essay]. Medium. Blake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&CK: Design and Philosophy [Historical Paper]. MITRE. Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Historic Paper]. Lockheed Martin Corporation. Nick Selby, 2014. One Year Later: The APT1 Report [Essay]. Dark Reading. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. Rick Howard, 2020. Intrusion kill chains: a first principle of cybersecurity. [Podcast]. The CyberWire. Rick Howard, 2022. Kill chain trifecta: Lockheed Martin, ATT&CK, and Diamond. [Podcast]. The CyberWire. Rick Howard, 2020. cyber threat intelligence (CTI) (noun) [Podcast]. Word Notes: The CyberWire. Kevin Mandia, 2014. State of the Hack: One Year after the APT1 Report [RSA Conference Presentation]. YouTube. SAHIL BLOOM, 2023. The Blind Men & the Elephant [Website]. The Curiosity Chronicle. Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 05 July 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research.[Historical Paper] Staff, n.d. Home Page [Website]. Tidal Cyber. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Attention.

0:10.0

Attention all security professionals want real-time IP intelligence at your

0:17.4

fingertips. Sign up for Scout Insights free trial today. Get immediate insights into threats.

0:24.0

Search any IP with no training required

0:27.0

and enjoy intuitive graphical results.

0:30.0

Whether you need to identify compromised hosts

0:32.0

or enrich

0:33.4

Splunk Queries, Scout Insight has you covered.

0:36.7

Don't wait, accelerate your threat response now.

0:40.4

Visit team cumri.com slash Cyberwire to start your free trial.

0:45.0

Hey everybody,

0:49.0

Rick here. The minor attack wiki is the only open source collection

0:57.1

dedicated to cataloging known nation state and some crime hacker tactics techniques tactics, techniques, and procedures,

1:04.3

TTPs, across the intrusion kill chain.

1:07.3

I've been a fan of it for over a decade now.

1:10.1

My old Intelligence Director, Ryan Olson, introduced me to it when we founded the

1:14.6

Palo Alto Network's public facing Intelligence Team, Unit 42. It took a while

1:19.6

for Ryan to get it through my thick head the immense potential value of the minor

1:24.2

intelligence collection to anybody pursuing the intrusion kill chain

1:28.4

prevention strategy. But once I got it it was like inserting the last piece into a very large puzzle.

1:35.0

It was a eureka moment for me.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.