EU ATT&CK community WorkShop (MIX) 作者: Hack Inn 时间: June 16, 2022 分类: 安全大会资料 访问: 13,359 次 ![logo](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/logo.png) > The EU ATT&CK community is a vendor neutral platform where users of the MITRE ATT&CK™ Framework can discuss, exchange and improve their use of adversary tactics and techniques in practical use cases. 这是一个合集贴会同步更新此系列所有会议资料This is a compilation post that will update all the conference materials in this series simultaneously ### 9th Workshop #### 1、[Kubernetes :: Untapped](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Kubernetes%20::%20Untapped.pdf) #### 2、[Top ATT&CK Techniques](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Top%20ATT&CK%20Techniques.pdf) #### 3、[Improving automation in threat intelligence](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Improving%20automation%20in%20threat%20intelligence.pdf) #### 4、[Using ATT&CK to prioritize defenses](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Using%20ATT&CK%20to%20prioritize%20defenses.pdf) #### 5、[pySigma - News, Project Structure & Contribution](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/pySigma%20-%20News,%20Project%20Structure%20&%20Contribution.pdf) #### 6、[An adversarial viewpoint to identify High Value Targets for increased Cyber Resilience](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/An%20adversarial%20viewpoint%20to%20identify%20High%20Value%20Targets%20for%20increased%20Cyber%20Resilience.pdf) #### 7、[Attack Flow – Beyond Atomic Behaviors](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Attack%20Flow%20–%20Beyond%20Atomic%20Behaviors.pdf) #### 8、[Defense and Detection in Depth using MITRE ATT&CK, MITRE D3FEND, and NIST SP 800-53](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Defense%20and%20Detection%20in%20Depth%20using%20MITRE%20ATT&CK,%20MITRE%20D3FEND,%20and%20NIST%20SP%20800-53.pdf) #### 9、[Leveraging MITRE ATT&CK Mitigations for posture analysis](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Leveraging%20MITRE%20ATT&CK%20Mitigations%20for%20posture%20analysis.pdf) #### 10、[Lessons Learned Through Adversary Emulation](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Lessons%20Learned%20Through%20Adversary%20Emulation.pdf) #### 11、[Auditd for the recently threatened](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Auditd%20for%20the%20recently%20threatened.pdf) #### 12、[ATT&CK enrichment in Sigma Splunk Backend](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/ATT&CK%20enrichment%20in%20Sigma%20Splunk%20Backend.pdf) #### 13、[Detection mapping, how does your coverage compare to ATT&CK?](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Detection%20mapping,%20how%20does%20your%20coverage%20compare%20to%20ATT&CK%3F.pdf) #### 14、[Kick-starting your DFIR in AWS security posture and rapid response](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Kick-starting%20your%20DFIR%20in%20AWS%20security%20posture%20and%20rapid%20response.pdf) #### 15、[ATT&CK IN CERT-EU'S REPORTS](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/ATT&CK%20IN%20CERT-EU'S%20REPORTS.pdf) #### 16、[Tidal Community Edition Making Threat-Informed Defense Easier - for All](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Tidal%20Community%20Edition%20Making%20Threat-Informed%20Defense%20Easier%20-%20for%20All.pdf) #### 17、[Using Natural Language Processing to Identify TTPs - txt2stix ](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/Using%20Natural%20Language%20Processing%20to%20Identify%20TTPs%20-%20txt2stix%20.pdf) #### 18、[The use of ATT&CK to defend against destructive cyber attacks](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/9th/The%20use%20of%20ATT&CK%20to%20defend%20against%20destructive%20cyber%20attacks.pdf) ### 8th Workshop #### 1、[The UNIX malware landscape Reviewing the goods at MALWAREbazaar](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/The%20UNIX%20malware%20landscape%20Reviewing%20the%20goods%20at%20MALWAREbazaar.pdf) #### 2、[WHIDS an Open-Source EDR for Windows](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/WHIDS%20an%20Open-Source%20EDR%20for%20Windows.pdf) #### 3、[MSRPC ATT&CK Mapping](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/MSRPC%20ATT&CK%20Mapping.pdf) #### 4、[Using MITRE Engage for Red Teaming Playbooks ... in 15min](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/Using%20MITRE%20Engage%20for%20Red%20Teaming%20Playbooks%20...%20in%2015min.pdf) #### 5、[Sigma Hall of Fame](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/Sigma%20Hall%20of%20Fame.pdf) #### 6、[ADVERSARY EMULATION GENERATING MITRE ATT&CK TECHNIQUE SEQUENCES](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/ADVERSARY%20EMULATION%20GENERATING%20MITRE%20ATT&CK%20TECHNIQUE%20SEQUENCES.pdf) #### 7、[ATT&CK Workbench](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/ATT&CK%20Workbench.pdf) #### 8、[Where We've Been and Where We're Going](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/Where%20We've%20Been%20and%20Where%20We're%20Going.pdf) #### 9、[CIRCL hashlookup - Supply Chain Compromise (T1195)](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/CIRCL%20hashlookup%20-%20Supply%20Chain%20Compromise%20%28T1195%29.pdf) #### 10、[New Resources from the Center](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/New%20Resources%20from%20the%20Center.pdf) #### 11、[ATT&CKing the Cloud:An analysis of MITRE ATT&CK and TeamTNT](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/ATT&CKing%20the%20Cloud:An%20analysis%20of%20MITRE%20ATT&CK%20and%20TeamTNT.pdf) #### 12、[Highlighting Your Gaps!](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/Highlighting%20Your%20Gaps!.pdf) #### 13、[Cybersecurity education professional](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/Cybersecurity%20education%20professional.pdf) #### 14、[REQUIREMENTS-DRIVEN INTEL - Using intelligence requirements to drive your ATT&CK strategy](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/REQUIREMENTS-DRIVEN%20INTEL%20-%20Using%20intelligence%20requirements%20to%20drive%20your%20ATT&CK%20strategy.pdf) #### 15、[EDR you covered ? Know your deficiencies](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/EDR%20you%20covered%20%3F%20Know%20your%20deficiencies.pdf) #### 16、[MITRE ATT&CK and Sigma improvements for Connected Cars](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/8th/MITRE%20ATT&CK%20and%20Sigma%20improvements%20for%20Connected%20Cars.pdf) ### 7th Workshop #### 1、[Creating Attack Graphs for Adversary Emulation, Simulation and Purple Teaming in Industrial Control Systems (ICS) Environments](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Creating%20Attack%20Graphs%20for%20Adversary%20Emulation,%20Simulation%20and%20Purple%20Teaming%20in%20Industrial%20Control%20Systems%20%28ICS%29%20Environments.pdf) #### 2、[How Google YARA-L Works with Sigma and Other Community Standards](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/How%20Google%20YARA-L%20Works%20with%20Sigma%20and%20Other%20Community%20Standards.pdf) #### 3、[TTPs with MITRE ATT&CK in TheHive](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/TTPs%20with%20MITRE%20ATT&CK%20in%20TheHive.pdf) #### 4、[MITRE ATT&CK Defender™](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/MITRE%20ATT&CK%20Defender™.pdf) #### 5、[News from Sigma](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/News%20from%20Sigma.pdf) #### 6、[Using ATT&CK for the C4ISR Architecture Framework](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Using%20ATT&CK%20for%20the%20C4ISR%20Architecture%20Framework.pdf) #### 7、[CyCAT - An Open and Public Cybersecurity Resource Catalogue.pptx](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/CyCAT%20-%20An%20Open%20and%20Public%20Cybersecurity%20Resource%20Catalogue.pptx.pdf) #### 8、[Updates from the MITRE ATT&CK® Team](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Updates%20from%20the%20MITRE%20ATT&CK®%20Team.pdf) #### 9、[Who littered the sandbox? Scooping up new malware behavior.](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Who%20littered%20the%20sandbox%3F%20Scooping%20up%20new%20malware%20behavior..pdf) #### 10、[Using MITRE ATT&CK for better communication](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Using%20MITRE%20ATT&CK%20for%20better%20communication.pdf) #### 11、[BUILDING AN INDICATORS OF RISK LIBRARY BASED ON ICS ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/BUILDING%20AN%20INDICATORS%20OF%20RISK%20LIBRARY%20BASED%20ON%20ICS%20ATT&CK.pdf) #### 12、[New Resources from the Center](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/New%20Resources%20from%20the%20Center.pdf) #### 13、[How to effectively use ATT&CK in the context of TIBER-EU](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/How%20to%20effectively%20use%20ATT&CK%20in%20the%20context%20of%20TIBER-EU.pdf) #### 14、[HOW TO INTEGRATE MITRE ATT&CK INTO OFFICIAL SECURITY DOCUMENTATIONS](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/HOW%20TO%20INTEGRATE%20MITRE%20ATT&CK%20INTO%20OFFICIAL%20SECURITY%20DOCUMENTATIONS.pdf) #### 15、[Extending MITRE ATT&CK for better adversary profiling](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Extending%20MITRE%20ATT&CK%20for%20better%20adversary%20profiling.pdf) #### 16、[ATT&CKing Active Directory:Automated AD Adversary Simulation](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/ATT&CKing%20Active%20Directory:Automated%20AD%20Adversary%20Simulation.pdf) #### 17、[Mapping Platform Security Stacks to ATT&CK:Data Format, Rubric & Methodology](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/7th/Mapping%20Platform%20Security%20Stacks%20to%20ATT&CK:Data%20Format,%20Rubric%20&%20Methodology.pdf) ### 6th Workshop #### 1、[Attacking the economics behind techniques used by adversaries](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Attacking%20the%20economics%20behind%20techniques%20used%20by%20adversaries.pdf) #### 2、[Threat Actor Context and Situational Awareness](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Threat%20Actor%20Context%20and%20Situational%20Awareness.pdf) #### 3、[HOW TO ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/HOW%20TO%20ATT&CK.pdf) #### 4、[PurpleSharp:Adversary Simulation with ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/PurpleSharp:Adversary%20Simulation%20with%20ATT&CK.pdf) #### 5、[From static to dynamic:transforming a SOC](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/From%20static%20to%20dynamic:transforming%20a%20SOC.pdf) #### 6、[CSIS Trojan Modelling using MITRE](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/CSIS%20Trojan%20Modelling%20using%20MITRE.pdf) #### 7、[Threat Information Exchange Challenges in Telecommunication](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Threat%20Information%20Exchange%20Challenges%20in%20Telecommunication.pdf) #### 8、[Update on OSCD, RE&CT and ATC](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Update%20on%20OSCD,%20RE&CT%20and%20ATC.pdf) #### 9、[Mapping Your Ransomware Threat Hunting Mission to the ATT&CK Framework](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Mapping%20Your%20Ransomware%20Threat%20Hunting%20Mission%20to%20the%20ATT&CK%20Framework.pdf) #### 10、[Tracking Adversary Techniques with ATT&CK:Easier Said than Done](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Tracking%20Adversary%20Techniques%20with%20ATT&CK:Easier%20Said%20than%20Done.pdf) #### 11、[50 Shades of Windows and Sysmon Events](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/50%20Shades%20of%20Windows%20and%20Sysmon%20Events.pdf) #### 12、[Hijacking DLLs in Windows](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Hijacking%20DLLs%20in%20Windows.pdf) #### 13、[The golden age of matrix-like models](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/The%20golden%20age%20of%20matrix-like%20models.pdf) #### 14、[Community Resource Updates](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/6th/Community%20Resource%20Updates.pdf) ### 5th Workshop #### 1、[B Z A R – Bro:Zeek ATT&CK®-based Analytics and Reporting](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/B%20Z%20A%20R%20–%20Bro:Zeek%20ATT&CK®-based%20Analytics%20and%20Reporting.pdf) #### 2、[CALDERA](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/CALDERA.pdf) #### 3、[DeTT&CT:Mapping your blue team to ATT&CK®](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/DeTT&CT:Mapping%20your%20blue%20team%20to%20ATT&CK®.pdf) #### 4、[ATT&CK and Deception](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/ATT&CK%20and%20Deception.pdf) #### 5、[Update from the MITRE ATT&CK Team](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Update%20from%20the%20MITRE%20ATT&CK%20Team.pdf) #### 6、[ATT&CK for Telecom](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/ATT&CK%20for%20Telecom.pdf) #### 7、[The 5G Battle](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/The%205G%20Battle.pdf) #### 8、[Creating Detection Research Opportunities](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Creating%20Detection%20Research%20Opportunities.pdf) #### 9、[Man-in-the-Network:Network Devices are Endpoints Too](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Man-in-the-Network:Network%20Devices%20are%20Endpoints%20Too.pdf) #### 10、[Detection resilience, sniffing out the Duke from the Bear](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Detection%20resilience,%20sniffing%20out%20the%20Duke%20from%20the%20Bear.pdf) #### 11、[An MSSP’s Guide to ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/An%20MSSP’s%20Guide%20to%20ATT&CK.pdf) #### 12、[EU ATT&CK Workshop Q&A_May 18-19_2020](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/EU%20ATT&CK%20Workshop%20Q&A_May%2018-19_2020.pdf) #### 13、[EU ATTACK workshop poll results](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/EU%20ATTACK%20workshop%20poll%20results.pdf) #### 14、[Supercharging Network Security w: SIGMA](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Supercharging%20Network%20Security%20w:%20SIGMA.pdf) #### 15、[Threat Hunting Process](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Threat%20Hunting%20Process.pdf) #### 16、[AMITT Framework - COVID-19 Disinformation Response](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/AMITT%20Framework%20-%20COVID-19%20Disinformation%20Response.pdf) #### 17、[All of the threats](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/All%20of%20the%20threats.pdf) #### 18、[ATT&CK for telco networks](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/ATT&CK%20for%20telco%20networks.pdf) #### 19、[Leverage Endpoint Visibility With ATT&CK Framework](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Leverage%20Endpoint%20Visibility%20With%20ATT&CK%20Framework.pdf) #### 20、[Using MITRE ATT&CK to improve SOC operations](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Using%20MITRE%20ATT&CK%20to%20improve%20SOC%20operations.pdf) #### 21、[Sub-techniques, priorities, more open source & MITRE ATT&CK™ at mobile phone](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Sub-techniques,%20priorities,%20more%20open%20source%20&%20MITRE%20ATT&CK™%20at%20mobile%20phone.pdf) #### 22、[Threat Operations using ATT&CK at the Bank of England](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Threat%20Operations%20using%20ATT&CK%20at%20the%20Bank%20of%20England.pdf) #### 23、[Applying MITRE to malware sandbox systems](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Applying%20MITRE%20to%20malware%20sandbox%20systems.pdf) #### 24、[Detection Development using Attack Range based on Mitre ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Detection%20Development%20using%20Attack%20Range%20based%20on%20Mitre%20ATT&CK.pdf) #### 25、[MAPPING INDICATORS OF RISK WITH ICS ATT&CK TTPS](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/MAPPING%20INDICATORS%20OF%20RISK%20WITH%20ICS%20ATT&CK%20TTPS.pdf) #### 26、[Atomic Threat Coverage Update](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Atomic%20Threat%20Coverage%20Update.pdf) #### 27、[50 Shades of Sigma](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/50%20Shades%20of%20Sigma.pdf) #### 28、[ATT&CK IN THREAT MODELING AND USE CASE GENERATION](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/ATT&CK%20IN%20THREAT%20MODELING%20AND%20USE%20CASE%20GENERATION.pdf) #### 29、[ATT&CK Scripts Navigator Layer Update](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/ATT&CK%20Scripts%20Navigator%20Layer%20Update.pdf) #### 30、[WRITING GOOD SIGMA RULES](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/WRITING%20GOOD%20SIGMA%20RULES.pdf) #### 31、[Applying ATT&CK to Web Applications](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Applying%20ATT&CK%20to%20Web%20Applications.pdf) #### 32、[Advanced features in MISP supporting your analysts and tools](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/5th/Advanced%20features%20in%20MISP%20supporting%20your%20analysts%20and%20tools.pdf) ### 4th Workshop #### 1、[DEVELOPING SAFE ATT&CK SCENARIOS FOR SECURITY VALIDATION](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/DEVELOPING%20SAFE%20ATT&CK%20SCENARIOS%20FOR%20SECURITY%20VALIDATION.pdf) #### 2、[MITRE ATT&CK™ Update](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/MITRE%20ATT&CK™%20Update.pdf) #### 3、[Visualizing ATT&CK data in Maltego](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Visualizing%20ATT&CK%20data%20in%20Maltego.pdf) #### 4、[Sigma Update:What’s new in Sigma](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Sigma%20Update:What’s%20new%20in%20Sigma.pdf) #### 5、[ATT&CK at Cegeka](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/ATT&CK%20at%20Cegeka.pdf) #### 6、[What The Log?! So many events, so little time](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/What%20The%20Log%3F!%20So%20many%20events,%20so%20little%20time.pdf) #### 7、[An introduction to the PRE-ATT&CK framework](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/An%20introduction%20to%20the%20PRE-ATT&CK%20framework.pdf) #### 8、[DETECTION IN LINUX CONTAINERS:MITRE ATT&CK IN CONTAINER ENVIRONMENTS & UPDATES TO CUSTOMER ADOPTION](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/DETECTION%20IN%20LINUX%20CONTAINERS:MITRE%20ATT&CK%20IN%20CONTAINER%20ENVIRONMENTS%20&%20UPDATES%20TO%20CUSTOMER%20ADOPTION.pdf) #### 9、[Generating MITRE ATT&CK DNA for groups of actors](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Generating%20MITRE%20ATT&CK%20DNA%20for%20groups%20of%20actors.pdf) #### 10、[Sigma for Cloud With MITRE ATT&CKTM?](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Sigma%20for%20Cloud%20With%20MITRE%20ATT&CKTM%3F.pdf) #### 11、[How matrix-like models are changing MISP](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/How%20matrix-like%20models%20are%20changing%20MISP.pdf) #### 12、[Mitre Att&ck Framework in Student CERT](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Mitre%20Att&ck%20Framework%20in%20Student%20CERT.pdf) #### 13、[Atomic Threat Coverage Update](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/4th/Atomic%20Threat%20Coverage%20Update.pdf) ### 3th Workshop #### 1、[MITRE ATT&CK BASED COMMAND AND CONTROL](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/MITRE%20ATT&CK%20BASED%20COMMAND%20AND%20CONTROL.pdf) #### 2、[Mapping your blue team to ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/Mapping%20your%20blue%20team%20to%20ATT&CK.pdf) #### 3、[Update on ATT&CK and CAR](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/Update%20on%20ATT&CK%20and%20CAR.pdf) #### 4、[Kickstart your SOC with [EU-][ATT&CK] Community Tooling](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/Kickstart%20your%20SOC%20with%20[EU-][ATT&CK]%20Community%20Tooling.pdf) #### 5、[Or how I failed to measure everything.](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/Or%20how%20I%20failed%20to%20measure%20everything..pdf) #### 6、[ATT&CK coverage assessment from a data perspective](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/ATT&CK%20coverage%20assessment%20from%20a%20data%20perspective.pdf) #### 7、[MISP and ATT&CK - an evolving integration](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/MISP%20and%20ATT&CK%20-%20an%20evolving%20integration.pdf) #### 8、[PRACTICAL THREAT HUNTING USING MITRE ATT&CK](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/PRACTICAL%20THREAT%20HUNTING%20USING%20MITRE%20ATT&CK.pdf) #### 9、[All Your Heatmaps Are Belong To Us - Short Version](https://data.hackinn.com/ppt/EUATTCKcommunityALLIN/3rd/All%20Your%20Heatmaps%20Are%20Belong%20To%20Us%20-%20Short%20Version.pdf) `版权归演讲者及会议主办方所有,官网:https://www.attack-community.org/ 如有疑问请联系:admin [at] hackinn.com` 标签: none