The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
Title: The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
Presenters: Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
Date: On-Demand
Abstract:
Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness
With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.
In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.
You’ll learn:
- October 19, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
- October 26, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
- November 2, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
- November 9, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation
Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".