The current state of MITRE ATT&CK.

Published: July 15, 2024, 6 a.m.

Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber\u2019s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene\u2019s VP of Information Security.\n\nReferences:\nAmy L. Robertson, 2024. ATT&CK 2024 Roadmap\xa0 [Essay]. Medium.\nBlake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&CK: Design and Philosophy [Historical Paper]. MITRE.\nEric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Historic Paper]. Lockheed Martin Corporation.\nNick Selby, 2014. One Year Later: The APT1 Report [Essay]. Dark Reading.\nRick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.\nRick Howard, 2020. Intrusion kill chains: a first principle of cybersecurity.\xa0 [Podcast]. The CyberWire.\nRick Howard, 2022. Kill chain trifecta: Lockheed Martin, ATT&CK, and Diamond. [Podcast]. The CyberWire.\nRick Howard, 2020. cyber threat intelligence (CTI) (noun) [Podcast]. Word Notes: The CyberWire.\nKevin Mandia, 2014. State of the Hack: One Year after the APT1 Report [RSA Conference Presentation]. YouTube. \nSAHIL BLOOM, 2023. The Blind Men & the Elephant [Website]. The Curiosity Chronicle.\nSergio Caltagirone, Andrew Pendergast, and Christopher Betz. 05 July 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research.[Historical Paper]\nStaff, n.d. Home Page [Website]. Tidal Cyber.\nLearn more about your ad choices. Visit megaphone.fm/adchoices