RSA 2024
Connect with MITRE experts advancing the global community of cyber defenders
Drawing on a 50+ year legacy, our holistic approach to cyber addresses the evolving challenges to securing people, systems, and sectors.
We accelerate innovation and secure critical infrastructure for dynamic environments across the nation—and around the world.
Our work advancing the cyber community with open-source tools and publicly available resources is vast. From CVE® and MITRE ATT&CK® to newer tools in AI, emulation, deception, and threat intelligence, we cover a lot of ground.
Booth 3430
Drop by to learn more about our capabilities at RSA!
MITRE Speakers at RSA
Tuesday, May 7, 1:15-2:05 p.m.
Julie Bowen, Sr. vice president, operations and outreach; chief legal officer
Topic: Avoiding Legal Landmines: A Review of Recent Cyber Cases
Bowen, alongside Richard Aldrich (Booz, Allen, Hamilton) and Swaminathan Aravind (Orrick, Herrington & Sutcliffe), will present a fast-paced interactive session on the leading cyber court cases from the past year. The session will identify the most important legal developments and their impact on firms and cyber professionals.
Bottom line: Attendees will learn practical steps to minimize loss or liability in the future.
Wednesday, May 8, 9:40-10:30 a.m.
James Memole Doodson, Ph.D., Principal behavioral psychologist for insider risk
Topic: Data-Driven Cyber Indicators of Malicious Insider Threat
MITRE’s Insider Threat Research & Solutions team analyzed data from 100 real employees searching, collecting, and exfiltrating sensitive internal information from an organization’s live production network with malicious intentions.
Bottom line: Attendees will learn three new analyses to arm insider risk programs with evidence supporting proactive insider risk endpoint detection capabilities.
Thursday, May 9, 12:30-1:20 p.m.
Deanna Caputo, Ph.D., Chief scientist for insider threat capabilities
Topic: Building the MITRE Insider Threat Framework: Team Sports Need Players
MITRE Insider Threat Research & Solutions is building an evolving, data-driven framework with human, cyber, and physical characteristics as common and observable indicators.
Bottom line: Attendees are invited to share and discuss their hopes for the framework. Such inputs ensure Insider Risk Programs more accurately deter, detect, and mitigate risks before they become threats.
Meet the Experts
Jon Baker, General Manager, Center for Threat-Informed Defense
Suneel Sundar, Director of R&D, Center for Threat-Informed Defense
Topic: Research & Resources to Improve your Threat-Informed Defense
Date/Time: Tuesday, May 7 at 11:30-12:30pm and Wednesday, May 8 at 11:30-12:30pm
Adam Pennington, Project Leader, ATT&CK
Topic: What’s New with MITRE ATT&CK
Date/Time: Tuesday, May 7 at 12:30-1:30pm and 1:30-2:30pm
Deanna Caputo, Chief Scientist for Insider Threat Capabilities
James Doodson, Principal Behavioral Psychologist for Insider Risk
Topic: Analyzing Human Behavioral Risks for Insider Threats
Date/Time: Tuesday, May 7 at 3:30-5:00pm and Wednesday, May 8 at 3:30-5:00pm
Shane Steiger, Principal Cybersecurity Engineer
Topic: Engineer and Navigating your Cyber Resiliency
Date/Time: Wednesday, May 8 at 1:30-2:30pm and Thursday, May 9 at 10-11:30am
Bob Martin, Senior Principal Software and Supply Chain Assurance Engineer
Topic: Building Secure Supply Chains with SBOMs and the MITRE System of Trust
Date/Time: Tuesday, May 7 at 10-11:30am and Wednesday, May 8 at 10-11:30am, 12:30-1:30pm, 2:30-3:30pm
Our Capabilities & Resources
MITRE ATLAS
A globally accessible, living knowledge base of adversary tactics and techniques based on real-world attack observations and realistic demonstrations from AI red teams and security groups.
MITRE ATT&CK
A globally accessible knowledge base of adversary behaviors based on real-world observations.
ATT&CK Evaluations
Evaluations follow a rigorous, transparent methodology, using a collaborative, threat-informed purple-teaming approach to evaluate solutions within the context of ATT&CK.
CALDERA
A scalable, automated adversary emulation platform that empowers cyber practitioners to save time, money, and energy through automated security assessments.
CAPEC
Common Attack Pattern Enumeration and Classification provides a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities.
CAVEAT
Cloud Adversarial, Vectors, Exploits, and Threats is a threat-informed framework addressing the unique risks of cloud environments with detailed security guidance to ensure implementation of detection and mitigation capabilities.
Center for Threat Informed Defense
The privately funded research and development center brings together sophisticated security teams from leading organizations around the world to conduct and share research that improves our collective ability to prevent, detect, and respond to cyber-attacks.
CREF Navigator
Cyber Resiliency Engineering Framework Navigator is a platform in which the complex relationships of NIST SP 800-160 Volume 2 can be searched and visualized, informing engineers designing resilient cyber solutions.
CVE
The Common Vulnerabilities and Exposures program identifies, defines, and catalogs publicly disclosed cybersecurity vulnerabilities.
CWE
Common Weakness Enumeration serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.
DEFEND
The MITRE-developed, National Security Agency-funded framework offers an open model with standardized vocabulary for employing techniques to counter malicious cyber activity.
ENGAGE
A framework for communicating and planning cyber adversary engagement, deception, and denial activities.
ECHO
Enhanced CTI Sharing for Partner Organizations (ECHO) is an application that mines and contextualizes cyber threat intelligence.
Health Cyber Ransomware Resource Center
A resource focused on defeating the increasing number of attacks aimed at the healthcare sector.
Insider Threat Research and Solutions
Data-driven frameworks, indicators, methodologies, mitigations, operational successes, and thought leadership to reduce the risk from harmful acts undertaken by trusted employees inside an organization.
OVAL
Open Vulnerability and Assessment Language is a community-developed language for determining vulnerability and configuration issues on computer systems.
Playbook for Threat Modeling Medical Devices
The playbook provides insights on how an organization can develop or evolve an approach to creating threat models in a systematic and consistent way.
SAF
The Security Automation Framework supports security processes at all stages of the software lifecycle, from planning secure system design to analyzing operational security data.
System of Trust
A framework that provides a comprehensive, community driven knowledge base of supply chain security risks and a customizable risk assessment process.
STIX
Structured Threat information eXpression is a collaborative, community-driven effort to define and develop a structured language to represent cyber threat information.
TAXII
Trusted Automated eXchange of Indicator Information is the preferred method of exchanging information using the STIX Language, enabling organizations to share structured cyber threat information in a secure and automated manner.
11 Strategies of a World Class Cyber Operations Center
The playbook covers best practices for managers, technical leads, engineers, and analysts to level up cyber defenses.
MITRE Connects
Careers & Workforce Development
We’re committed to closing the cyber workforce gap with internships (Cyber Futures) targeting Historically Black Colleges and Universities, Minority Serving Institutions, and neurodiverse candidates. We also have specialized programs (Cyber New Professionals) for early and mid-career employees.
Join our community and amplify your impact for public good.
Reach Out
For media questions: Lisa Fasold