Detecting threat actors targeting Australian businesses through TTPs

Tuesday
 
18
 
March
, 
3:50 pm
 - 
4:30 pm

Speakers

Yury Sergeev

Yury Sergeev

Director
RST Cloud

Synopsis

In this technical session, we will explore how to continuously convert the latest knowledge of threat actor Tactics, Techniques, and Procedures (TTPs) into actionable detection rules in SIEMs, tailored specifically to threats targeting Australian businesses. Taking a practical approach, we will demonstrate how to create detection logic that maps to MITRE ATT&CK and other relevant frameworks such as the Cyber Analytics Repository (CAR) and SIGMA, providing concrete examples of rule logic for various attack stages.

The talk will also cover how to build an automated pipeline for delivering these detection rules as code, ensuring a scalable and maintainable CTI-based detection strategy. We will walk through a model, demonstrating how rules can be continuously updated and deployed in real time, making your detection infrastructure both adaptive and resilient.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.