BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20160313T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20161106T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20160911T224619Z
UID:22E76242-AF5A-11E5-A050-0050568D2FB3
DTSTART;TZID=US/Eastern:20161025T173000
DTEND;TZID=US/Eastern:20161025T194500
DESCRIPTION:Understanding Cyber Adversaries with ATT&amp;CK – The Post-Exploi
 t Threat Model\nPresented by Dr. Andy Applebaum\, Senior Cyber Security En
 gineer\, MITRE\nTuesday\, October 25\, 2016\n5:30 – 6:30 PM – Networki
 ng &amp; Open House 6:30 – 7:30 PM - Program 7:30 – 7:45 PM – Announceme
 nts There is no cost to attend at McLean or Silver Spring\n\nRecent breach
 es have shown an ugly truth: determined adversaries will get into your net
 work. This talk will present the MITRE-developed Adversarial Tactics\, Tec
 hniques &amp; Common Knowledge (ATT&amp;CK)\, a framework for describing the actio
 ns an adversary may take while operating within an enterprise network afte
 r they compromise it. ATT&amp;CK provides a common way to characterize and des
 cribe post-compromise adversary behavior and\, unlike other models\, was d
 eveloped via red teaming and analyzing public cyber threat intelligence re
 ports: the tactics and techniques in ATT&amp;CK are real ones that adversaries
  have used in the wild. Using ATT&amp;CK\, security personnel can better under
 stand and prepare for what adversaries are doing after they breach a netwo
 rk’s defenses\, benefitting business owners and network managers in the 
 process. In this presentation\, we will outline the key features of ATT&amp;CK
 \, describing the tactics\, techniques\, groups\, and software that make u
 p ATT&amp;CK\, and outlining lessons learned using the model\, including data-
 based takeaways from ATT&amp;CK and potential use cases. Topics covered will i
 nclude using ATT&amp;CK for red teaming\, defensive gap analysis\, threat repo
 rting with ATT&amp;CK\, and information sharing.\nDr. Andy Applebaum is a Seni
 or Cyber Security Engineer at The MITRE Corporation\, where he works on in
 ternal and sponsor-facing projects. His current research areas include off
 ensive and defensive security automation\, applying formal methods to thre
 at modeling\, and reasoning under uncertainty. He obtained his Ph.D. in co
 mputer science from the University of California Davis\, where his dissert
 ation topic was using argumentation logic for reasoning in cyber security\
 , including firewall configuration management\, secure network administrat
 ion\, and alert correlation. He has a B.A. in computer science from Grinne
 ll College.\n\nJoin online meeting: https://asq509.webex.com/asq509/j.php?
 MTID=mbe1b51c2d4c0cc7126819b7acedf6218\n\nMeeting number: 805 274 863 Meet
 ing password: g3c27D2b\n\nJoin by Phone: 1-650-479-3208 Call-in toll numbe
 r (US/Canada) Access Code: 805 274 863\n\nCo-sponsored by: ASQ 509 SW SIG\
 n\nSpeaker(s): \, \, \, \n\nAgenda: \nTuesday\, October 25\, 2016\n5:30 
 – 6:30 PM – Networking &amp; Open House\n\n6:30 – 7:30 PM - Program\n\n7
 :30 – 7:45 PM – Announcements\n\nBldg: MITRE-2 Building\, Room 1N100\,
  7515 Colshire Drive\, McLean\, Virginia\, United States\, 22102 
LOCATION:Bldg: MITRE-2 Building\, Room 1N100\, 7515 Colshire Drive\, McLean
 \, Virginia\, United States\, 22102 
ORGANIZER:SoftwareSIG@asq509.org
SEQUENCE:6
SUMMARY:Understanding Cyber Adversaries with ATT&amp;CK – The Post-Exploit Th
 reat Model 
URL;VALUE=URI:https://events.vtools.ieee.org/m/37617
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Understanding Cyber Adversaries wi
 th ATT&amp;amp\;CK &amp;ndash\; The Post-Exploit Threat Model&lt;/strong&gt; &lt;br /&gt;Prese
 nted by Dr. Andy Applebaum\, Senior Cyber Security Engineer\, MITRE &lt;br /&gt;
 Tuesday\, October 25\, 2016 &lt;br /&gt;5:30 &amp;ndash\; 6:30 PM &amp;ndash\; Networkin
 g &amp;amp\; Open House 6:30 &amp;ndash\; 7:30 PM - Program 7:30 &amp;ndash\; 7:45 PM 
 &amp;ndash\; Announcements There is no cost to attend at McLean or Silver Spri
 ng&lt;/p&gt;\n&lt;p&gt;Recent breaches have shown an ugly truth: determined adversarie
 s will get into your network. This talk will present the MITRE-developed A
 dversarial Tactics\, Techniques &amp;amp\; Common Knowledge (ATT&amp;amp\;CK)\, a 
 framework for describing the actions an adversary may take while operating
  within an enterprise network after they compromise it. ATT&amp;amp\;CK provid
 es a common way to characterize and describe post-compromise adversary beh
 avior and\, unlike other models\, was developed via red teaming and analyz
 ing public cyber threat intelligence reports: the tactics and techniques i
 n ATT&amp;amp\;CK are real ones that adversaries have used in the wild. Using 
 ATT&amp;amp\;CK\, security personnel can better understand and prepare for wha
 t adversaries are doing after they breach a network&amp;rsquo\;s defenses\, be
 nefitting business owners and network managers in the process. In this pre
 sentation\, we will outline the key features of ATT&amp;amp\;CK\, describing t
 he tactics\, techniques\, groups\, and software that make up ATT&amp;amp\;CK\,
  and outlining lessons learned using the model\, including data-based take
 aways from ATT&amp;amp\;CK and potential use cases. Topics covered will includ
 e using ATT&amp;amp\;CK for red teaming\, defensive gap analysis\, threat repo
 rting with ATT&amp;amp\;CK\, and information sharing. &lt;br /&gt;Dr. Andy Applebaum
  is a Senior Cyber Security Engineer at The MITRE Corporation\, where he w
 orks on internal and sponsor-facing projects. His current research areas i
 nclude offensive and defensive security automation\, applying formal metho
 ds to threat modeling\, and reasoning under uncertainty. He obtained his P
 h.D. in computer science from the University of California Davis\, where h
 is dissertation topic was using argumentation logic for reasoning in cyber
  security\, including firewall configuration management\, secure network a
 dministration\, and alert correlation. He has a B.A. in computer science f
 rom Grinnell College.&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;Join online meeting: https:/
 /asq509.webex.com/asq509/j.php?MTID=mbe1b51c2d4c0cc7126819b7acedf6218&lt;/p&gt;\
 n&lt;p&gt;Meeting number: 805 274 863 Meeting password: g3c27D2b &amp;nbsp\;&lt;/p&gt;\n&lt;p
 &gt;Join by Phone: &amp;nbsp\;1-650-479-3208 Call-in toll number (US/Canada) Acce
 ss Code: &amp;nbsp\;805 274 863&amp;nbsp\;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;Tuesday
 \, October 25\, 2016 &lt;br /&gt;5:30 &amp;ndash\; 6:30 PM &amp;ndash\; Networking &amp;amp\
 ; Open House&lt;/p&gt;\n&lt;p&gt;6:30 &amp;ndash\; 7:30 PM - Program&lt;/p&gt;\n&lt;p&gt;7:30 &amp;ndash\;
  7:45 PM &amp;ndash\; Announcements&lt;/p&gt;
END:VEVENT
END:VCALENDAR

