Tidal Wave Webcast Series

The Next Evolution of Security: Threat-Led Defense Built on Procedures

Technique Abstraction Is the Start. Enterprises Turn to Procedures to Prove Their Defenses Stop Real Attacks

 

Thursday, April 30 2026 | 12:00PM – 1:00PM EDT 

Threat-Led Defense Is the New Standard Powered by Procedures,

Proven in Execution

Register Now

As security teams face increasing complexity, one thing is becoming clear: techniques and tool coverage alone are not enough. By grounding security in procedures, organizations gain the execution-level specificity to disrupt attacks where they actually occur, not where they are merely possible, reducing both attacker success and residual risk.

This webcast explores how Threat-Led Defense, built on procedures, is redefining modern security.

You’ll learn how organizations are moving beyond coverage mapping and tool alignment to:

    • Understand adversary execution at the procedural level not just abstract techniques
    • Operationalize threat intelligence into concrete action, making CTI directly usable by security teams
    • Prioritize detections based on procedures, the actual steps adversaries take to executing an attack, enabling detection engineering and detection-as-code
    • Build defenses threat-first, not tool-first, aligning security investments to what actually reduces attacker success

Join us to see why procedural Threat-Led Defense is quickly becoming the standard of excellence for modern enterprise security programs.

 

 

Guest Speakers:

Frank-Duff-400Frank Duff, Chief Innovation Officer & Co-founder, Tidal Cyber

Frank is a distinguished thought leader in threat-led defense and founded MITRE’s ATT&CK Evaluations. At Tidal Cyber, Frank and his team are responsible for the continued innovation and evolution of our Threat-Led Defense platform and building new features that meet the needs of our customers in the overall market.

Cat Self HeadshotCat Self, Senior Director of Adversary Research, Tidal Cyber

Cat is a recognized expert in cyber threat intelligence and adversary emulation, leading adversary research at Tidal Cyber with a focus on advancing procedural-level intelligence and testing.