2020 Rochester Virtual Symposium
Effectively Leveraging MITRE ATT&CK

#IANSRochester #IANSEvents

Thursday, May 28, 2020 | 10:00 AM - 12:30 PM
Web Conference, Rochester, NY

IANS has run multiple workshops on threat hunting, purple teaming and tool selection, but MITRE ATT&CK has opened up a new range of possibilities for how to approach these areas.

This symposium will begin with an overview of how the framework works and then delve into several key areas. The agenda will include:

  • What MITRE ATT&CK is and how it works
  • Its applications for purple teaming, threat modeling/hunting, tool selection, and vulnerability management
  • Sigma, Caldera and Red Canary, and where they fit in
  • Commercial tools for attack simulation
  • Making MITRE ATT&CK part of your daily process


This regional in-person symposium has been updated to a virtual event and is intended for practitioners from the Rochester metro area. For people outside of the region who wish to join, attendance is subject to capacity. We will inform out-of-metro registrants on the status of their registration one week in advance of the symposium.

This event is for IANS clients and invited guests — there is no vendor sponsorship or presence.

Let your colleagues know you're coming!

This event has ended.

Check out our other upcoming events!

View All Events
*Receive 1 CPE credit for every hour of attendance at our events.

2020 Rochester Virtual Symposium Facilitators


John Strand

IANS Faculty

John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

Achievements & Noteworthy Contributions
  • Co-author of Offensive Countermeasures: The Art of Active Defense (2013)
  • Contributor to the Penetration Testing Execution Standard (PTES)
  • Contributor to the 20 Critical Controls frameworks
  • Former co-host of Hack Naked TV and Security Weekly podcasts
  • Presenter at information security conferences such as RSA and Black Hat
  • Author of Black Hat’s "Active Defense, Offensive Countermeasures, and Hacking Back" course
  • Author of SANS Institute’s "Hacker Tools, Techniques, Exploits and Incident Handling" course
  • Former Information Assurance lead at Northrop Grumman and Accenture Certifications & Credentials


Web Conference

Registrants will receive a logistics email with web conference meeting information one day prior to the event.

Attendee Qualification

This Symposium is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Symposium to any entity or individual. IANS’ receipt of a registration application does not constitute acceptance. Individuals from Information Security Solution Providers (software, hardware, and consulting companies) are not eligible to attend. Symposiums are open to IANS clients that are Credential Holders and qualified Information Security Practitioners identified by IANS.

Attendee Contact


Check out IANS other upcoming events