Nowadays, more and more security assessments will use BAS (Breach and Attack Simulation) solutions. However, two problems become important and difficult. 1. How to grasp the TTPs (Tactics, Techniques, and Procedures) used by cyberattacks in the wild in a timely and highly automated manner. 2. How to synthesize attack chains of TTPs which is adaptive to this enterprise’s defense-in-depth system, in order to evaluate the target’s defense capability.... By: Porot Mo , Jack Tang , Lorin Wu Full Abstract and Presentation Materials: #when-knowledge-graph-meets-ttps-highly-automated-and-adaptive-executable-ttp-intelligence-for-security-evaluation-30406
Hide player controls
Hide resume playing