Breaking Down Silos With Threat-Informed Defense
Jon Baker’s interview discussing how organizations can align SOC, Red Teams and Intel Units at recent RSAC conference.
Jon Baker’s interview discussing how organizations can align SOC, Red Teams and Intel Units at recent RSAC conference.
In this episode of the Be Fearless Podcast, SquareX Field CISO John Carse speaks with Mike Cunningham, R&D Program Manager at MITRE’s Center for Threat-Informed Defense.
Mike brings his unique background from the Navy and NSA to discuss how organizations can better defend against cyber …
A 4-part video series where we teamed up with Adam Shostack, a leading expert in threat modeling and author of ‘Threat Modeling: Designing for Security’ to explore the 4 fundamental questions of threat modeling that every defender should ask. Episode 1: What Are We Working On? Episode 2: …
Practical threat modeling experience is often centered in a single organization, and the fish doesn’t see the ocean. Learn from experts serving hundreds of organizations how ATT&CK provides an empirically grounded model that’s been successfully applied across commercial and government customers.
Jon Baker joins the Top Cyber Pro podcast to discuss the Center’s work and impact, including Top ATT&CK Techniques, Technique Inference Engine, Mappings Explorer, and Secure AI.
In this episode, we dive deep into the world of Threat Informed Defense with our special guest from MITRE, a leader in cybersecurity innovation. Discover how organizations can shift from reactive to proactive security postures by leveraging real-world threat intelligence, advanced frameworks, and …
Christina Liaghati, MITRE ATLAS Lead, and Jonathan Baker, Center for Threat-Informed Defense Director, discuss taking a threat-informed approach to securing AI-enabled systems. Learn more about using MITRE ATLAS as a framework for understanding threats to AI-enabled systems, our AI Incident Sharing …
Jon Baker of MITRE’s Center for Threat-Informed Defense celebrates the Center’s 5th anniversary, detailing what they’ve done, but also what new research is coming out to help cyber defenders.
Many threat detections are easily evaded by sophisticated adversaries. Systematically improving detection capabilities is a challenge for many organizations. In this video, Michaela Adams and Jacob Shorr discuss how the Summiting the Pyramid (STP) framework can help. STP measures the robustness of …
The Center for Threat-Informed Defense presents their “Summiting the Pyramid” research project at Schmoocon, a major cybersecurity conference. Steve Luke, Michaela Adams, and Roman Dasczcyszak explain how to describe, characterize, and score the robustness of cyber detections against a sophisticated …