Threat-Led Defense: From Adversary Insight to Detection Precision

Binary Defense

December 15th, 2025 | 2PM EST | Presented by Binary Defense & Tidal Cyber

Modern detection engineering is evolving—and organizations need a smarter, more targeted approach to defend against today’s adversaries. In this webinar, Binary Defense and Tidal Cyber break down how a truly threat-led strategy helps security teams move beyond generic detections and instead focus on the behaviors, techniques, and impact paths that matter most.

Join John Dwyer, Deputy CTO & Head of ARC Labs at Binary Defense, and Frank Duff, Chief Innovation Officer & Co-Founder at Tidal Cyber, as they explore how threat profiling, adversary clustering, and attack-coverage mapping transform the way defenders prioritize detection engineering. They’ll unpack why “green spreadsheets” and broad ATT&CK coverage aren’t enough—and how contextualizing threats to each organization’s environment drives higher-impact, higher-fidelity detections.

Through real examples and platform walk-throughs, John and Frank demonstrate how Binary Defense and Tidal Cyber partner to:

  • Identify which adversaries are most relevant to a client’s industry, geography, and operational impact

  • Prioritize detection work based on adversary procedures—not generic techniques.

  • Use procedure-level intelligence and clustering to reveal overlaps across ransomware operators.

  • Strengthen defenses against true impact events—the actions that lead to business-disrupting crises.

  • Operationalize detection pipelines by aligning out-of-the-box controls, custom analytics, and new detection ideas into a single prioritized backlog.

Whether you’re building a detection engineering program or strengthening your threat-informed workflows, this session shows how defenders can reduce noise, focus engineering effort, and measurably decrease the likelihood of high-impact incidents

Register

Binary Defense needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.