What You Need to Know Before
You Start
Starts 8 June 2025 19:56
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
When Knowledge Graph Meets TTPs - Automated and Adaptive Executable TTP Intelligence for Security
Explore automated TTP intelligence for security assessments using knowledge graphs, enhancing breach simulation with adaptive attack chains to evaluate defense capabilities effectively.
Black Hat
via YouTube
Black Hat
2544 Courses
41 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore automated TTP intelligence for security assessments using knowledge graphs, enhancing breach simulation with adaptive attack chains to evaluate defense capabilities effectively.
Syllabus
- Introduction to Tactics, Techniques, and Procedures (TTPs)
- Fundamentals of Knowledge Graphs
- Integrating Knowledge Graphs with TTPs
- Automated Intelligence in Security Assessments
- Designing Adaptive Attack Chains
- Simulating Breaches with Knowledge-Enhanced Attack Chains
- Assessing Defense Capabilities
- Case Studies and Practical Applications
- Tools and Technologies
- Challenges and Future Directions
- Conclusion
Definition and significance in cybersecurity
Overview of TTP lifecycle
Definition and components
Examples of knowledge graphs in cybersecurity
Mapping TTPs into knowledge graphs
Benefits of using knowledge graphs for TTP analysis
Automation in threat intelligence
Role of AI and machine learning in automating TTP detection
Understanding attack chains
Techniques for creating adaptive attack scenarios
Building realistic breach simulations
Knowledge graph-driven adaptation in attack simulations
Metrics for evaluating security defenses
Methods for using TTP simulations to test defenses
Real-world examples of knowledge graph and TTP integration
Hands-on exercises in developing adaptive attack simulations
Overview of software and platforms for knowledge graphs and TTPs
Practical guide to selecting and implementing tools
Limitations in current TTP intelligence approaches
Emerging trends in AI-driven threat intelligence
Summary of key concepts
Future learning paths and resources for continued study
Subjects
Conference Talks