How to Level Up Your Threat Intel with Attack Flows

Describing adversary behavior using the ATT&CK knowledge base is a cornerstone of the threat-informed defense paradigm. Techniques rarely occur in isolation, and instead, the attacker typically uses each technique to pave the way for others as they pursue their ultimate objectives. Tap into the ways you can expand your knowledge surrounding threat intelligence by utilizing Attack Flows—the basis for attack graphs within the AttackIQ platform. In this demo, the AttackIQ Adversary Research Team will show you how Attack Flows model these sequences of ATT&CK techniques to make threat intelligence more powerful and visual.