The Next Evolution of Security: Threat-Led Defense Built on Procedures
Technique Abstraction Is the Start. Enterprises Turn to Procedures to Prove Their Defenses Stop Real Attacks
Thursday, April 30 2026 | 12:00PM – 1:00PM EDT
Threat-Led Defense Is the New Standard Powered by Procedures,
Proven in Execution
Register Now
As security teams face increasing complexity, one thing is becoming clear: techniques and tool coverage alone are not enough. By grounding security in procedures, organizations gain the execution-level specificity to disrupt attacks where they actually occur, not where they are merely possible, reducing both attacker success and residual risk.
This webcast explores how Threat-Led Defense, built on procedures, is redefining modern security.
You’ll learn how organizations are moving beyond coverage mapping and tool alignment to:
- Understand adversary execution at the procedural level not just abstract techniques
- Operationalize threat intelligence into concrete action, making CTI directly usable by security teams
- Prioritize detections based on procedures, the actual steps adversaries take to executing an attack, enabling detection engineering and detection-as-code
- Build defenses threat-first, not tool-first, aligning security investments to what actually reduces attacker success
Join us to see why procedural Threat-Led Defense is quickly becoming the standard of excellence for modern enterprise security programs.
Guest Speakers:
Frank Duff, Chief Innovation Officer & Co-founder, Tidal Cyber
Frank is a distinguished thought leader in threat-led defense and founded MITRE’s ATT&CK Evaluations. At Tidal Cyber, Frank and his team are responsible for the continued innovation and evolution of our Threat-Led Defense platform and building new features that meet the needs of our customers in the overall market.
Cat Self, Senior Director of Adversary Research, Tidal Cyber
Cat is a recognized expert in cyber threat intelligence and adversary emulation, leading adversary research at Tidal Cyber with a focus on advancing procedural-level intelligence and testing.
