Explore the intersection of Knowledge Graphs and TTPs in this Black Hat conference talk. Delve into the challenges faced by modern security assessments using Breach and Attack Simulation (BAS) solutions. Learn how to automatically capture and analyze Tactics, Techniques, and Procedures (TTPs) employed by real-world cyberattacks. Discover methods for synthesizing adaptive attack chains that evaluate an enterprise's defense-in-depth capabilities. Gain insights from speakers Porot Mo, Jack Tang, and Lorin Wu as they present innovative approaches to enhancing security evaluation through automated and adaptive executable TTP intelligence.
Overview
Syllabus
When Knowledge Graph Meets TTPs: Automated & Adaptive Executable TTP Intelligence for Security
Taught by
Black Hat