Posted by:

David Greenwood

David Greenwood, Chief of Signal

If you are reading this blog post via a 3rd party source it is very likely that many parts of it will not render correctly. Please view the post on for the full interactive viewing experience.

In this post I end the tutorial series with some real world examples of how ATT&CK is being used from the most recent ATT&CKCON.

Note: this tutorial is written for MITRE ATT&CK version 11.0 (published on 2022-04-24). Some of the concepts discussed are not correct for other versions of ATT&CK.

MITRE’s ATT&CKcon (v3.0) returned to an in-person event at their headquarters in McLean, Virginia, a little over a month ago (March 29 and 30), and was in-part the inspiration for my last two posts; MITRE ATT&CK 101, and MITRE ATT&CK 102.

It is also a celebration of the recent release of version 11 of ATT&CK.

There was a great list of speakers, including many old colleagues, talking about a range of topics centered on how the ATT&CK framework is leveraged.

You can watch all the talks on-demand here (sign up required). Here are four of my favourites.

Knowledge for the Masses: Storytelling with ATT&CK!

Mapping to MITRE ATT&CK

By Ismael Valenzuela and Jose Luis Sanchez Martinez

Creating and sharing compelling stories about cyber threats (with the help of ATT&CK) is a powerful way for raising awareness to enable action against cyber threats.

In this talk Ismael and Jose share their experiences leveraging ATT&CK to disseminate threat knowledge to different audiences by captivating them with a story (Software Development teams, Managers, Threat detection engineers, etc.).

Watch on-demand.

Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interactive Intrusion Campaigns

Mapping to MITRE ATT&CK

By Jason Wood and Justin Swisher

Security teams need tools and processes that allow the mapping of hands-on adversary tradecraft.

Jason and Justin show how their threat hunting team uses MITRE ATT&CK to understand and categorise adversary activity over time.

Watch on-demand.

It’s Just a Jump to the Left (of Boom): Prioritizing Detection Implementation with Intelligence and ATT&CK

Prioritizing Detection Implementation with Intelligence and ATT&CK

By Lindsay Kaye and Scott Small

A wealth of open-sourced, ATT&CK-mapped, detections and intelligence now exists for security teams.

Lindsay and Scott show how real-world defensive strategies can be strengthened by encompassing a full-spectrum view of this data to ensure that detection efforts are prioritised and focused effectively (with the help of ATT&CK).

Watch on-demand.

Threat Modelling: It’s Not Just for Developers

Threat Modelling

By Tim Wadhwa-Brown

Most intel teams take public information about threat actors, vulnerabilities, and incidents (and use them to build better defenses).

Tim takes the audience through 3 real world examples where he leveraged such data and how he used ATT&CK information (particularly data sources) to achieve a successful outcome.

Watch on-demand.


You have made it to the end of this short course.

Whilst there is a little more to ATT&CK than covered in these posts, you now have enough to start putting the framework to work, whether you are a red, blue, or purple teamer.

Here are some useful links to bookmark following this course, some I have covered, some I have not, that you I find useful when working with MITRE ATT&CK:

If you have any questions about the content in this tutorial, please do not hesitate to drop us a message on Slack.

ATT&CK Certification (Virtual and In Person)

The content used in this post is a small subset of our full training material used in our ATT&CK training.

If you want to join a select group of certified ATT&CK professionals, subscribe to our newsletter below to be notified of new course dates.

Discuss this post

Signals Corps Slack

Never miss an update

Sign up to receive new articles in your inbox as they published.