Overview
Explore the concept of generating MITRE ATT&CK DNA for groups of actors in this informative 36-minute conference talk by Sergey Polzunov from Cooper. Delve into the hypothesis, algorithm, and hitmap behind this approach, and learn about term frequency analysis. Examine use cases, including threat actor groups emulating each other, and discuss challenges faced in the process. Discover available resources, the potential for a centralized repository, and ways the community can contribute. Gain insights into the application of natural language processing in this field, with a specific focus on China-related threat actors.
Syllabus
Introduction
Hypothesis
Algorithm
Hitmap
Term Frequency
Disclaimer
China
Use cases
Threat actor groups emulating each other
What are the challenges
What resources are available
Is there a centralized repository
How can the community help
Natural language processing
Taught by
Cooper