Skip to content

Commit

Permalink
Updated presentation links and faq page
Browse files Browse the repository at this point in the history
  • Loading branch information
adpare committed Aug 16, 2023
1 parent 355a504 commit ea64f47
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion data/faq.json
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@
"questions": [
{
"question": "How should I reference the name ATT&CK?",
"answer": "<p>Both MITRE ATT&CK<sup>&reg;</sup> and ATT&CK<sup>&reg;</sup> are registered trademarks of The MITRE Corporation.</p><p>For more information please visit our <a href=\"/resources/brand\">Brand Guide</a></p>"
"answer": "<p>Both MITRE ATT&CK<sup>&reg;</sup> and ATT&CK<sup>&reg;</sup> are registered trademarks of The MITRE Corporation.</p><ul><li>Your first references in writing must include \"MITRE\" preceding \"ATT&CK<sup>&reg;</sup>\" - but subsequently should just reference \"ATT&CK\" (no registered trademark symbol required).<ul><li>Example of a first reference: <i>MITRE ATT&CK<sup>&reg;</sup> is a curated knowledge base and model for cyber adversary behavior...</i></li><li>Example of subsequent reference: <i>ATT&CK is useful for understanding security risk against known adversary behavior...</i></li></ul><li>A headline should <i>always</i> reference \"MITRE ATT&CK\" together (never only \"ATT&CK<sup>&reg;</sup>\").</li><li>Always capitalize \"ATT&CK\" to distinguish it from the surrounding text.</li><li>Do not modify the trademark, such as through hyphenation or abbreviation. For example, \"ATT&CK'd!\", \"Plan-of-ATT&CK\", \"ATTK\".</li><li>You may not display the ATT&CK trademark in any manner that implies an affiliation with, sponsorship, or endorsement by MITRE, or in a manner that can be reasonably interpreted to suggest third party content represents the views and opinions of MITRE or MITRE personnel, unless those third parties receive express permission from MITRE.</li><li>You may not use ATT&CK in your product names, service names, trademarks, logos, or company names.</li></ul> For more information please visit our <a href=\"/resources/brand\"> Brand Guide </a>"
},
{
"question": "Where can I download the MITRE ATT&CK logo?",
Expand Down
8 changes: 4 additions & 4 deletions data/resources.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
{
"name": "Automation: The Wonderful Wizard of CTI (Or Is IT?)",
"date": "January 2020",
"url": "https://www.sans.org/presentations/automation-the-wonderful-wizard-of-cti-or-is-it/",
"url": "https://www.slideshare.net/MITREATTACK/automation-the-wonderful-wizard-of-cti-or-is-it",
"description": "This presentation from the SANS CTI Summit explores how automation can be applied to cyber threat intelligence using the Threat Report ATT&CK Mapper (TRAM)."
},
{
Expand All @@ -22,7 +22,7 @@
"name": "Turning Intelligence Into Action with MITRE ATT&CK",
"date": "October 2019",
"url": "https://www.anomali.com/resources/webcasts/turning-intelligence-into-action-with-mitre-attck-detect-19-presentation-series",
"description": "This presentation from Anomali Detect discusses how you can use ATT&CK for threat intelligence, including a process for mapping intelligence to ATT&CK as well as biases to watch out for as you do this. <a href='https://www.slideshare.net/AdamPennington4/anomali-detect-19-nickels-pennington-turning-intelligence-into-action-with-mitre-attck-177846813'>Slides are also available</a>."
"description": "This presentation from Anomali Detect discusses how you can use ATT&CK for threat intelligence, including a process for mapping intelligence to ATT&CK as well as biases to watch out for as you do this. <a href='https://www.mitre.org/sites/default/files/2021-10/first-cti-turning-intelligence-into-action-mitre-attack-2019.pdf'>Slides are also available</a>."
},
{
"name": "Leveraging MITRE ATT&CK for Detection, Analysis & Defense",
Expand Down Expand Up @@ -57,7 +57,7 @@
{
"name": "Do-It-Yourself ATT&CK Evaluations to Improve Your Security Posture",
"date": "June 2019",
"url": "https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1559672321.pdf",
"url": " https://www.sans.org/presentations/do-it-yourself-att-ck-evaluations-to-improve-your-security-posture/",
"description": "This presentation from the SANS Enterprise Defense Summit explains how defenders can improve their security posture through the use of adversary emulation by performing their very own ATT&CK Evaluations."
},
{
Expand Down Expand Up @@ -123,7 +123,7 @@
{
"name": "ATT&CKing the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK",
"date": "September 2018",
"url": "https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1536260992.pdf",
"url": "https://www.slideshare.net/KatieNickels/threatbased-adversary-emulation-with-mitre-attck",
"description": "This presentation from the SANS Threat Hunting Summit shows how you can use ATT&CK to apply threat intelligence to adversary emulation."
},
{
Expand Down

0 comments on commit ea64f47

Please sign in to comment.