Red vs. Blue: Using Attack Simulation to Detect Stealthy Techniques

Logo
Presented by

Garrett Enochs, Rapid7 & Julius Callahan, Rapid7

About this talk

Nearly every security product on the market today will help you “detect threats”. But, how do you know if your tools are working well, and where to invest next? We believe the answer lies at the intersection of proactive threat modeling and consistent attack simulation. If you can model and predict the types of attacks you’ll face (e.g. phishing, insider threat, DDOS), then your monitoring efforts can focus on the key techniques that power the attack (e.g. Powershell commands are used by attackers to evade AV & whitelisting defenses). If you’d like a refresher on the top threats facing industries today, and how penetration testers and attackers alike move through a network, this special webcast is for you. Come see: 1. The core techniques that penetration testers & attackers use alike 2. How blue teams are monitoring for these stealthy behaviors 3. Why teams are turning to cloud-scale security analytics This webcast will include footage of Metasploit, common attacker techniques, and our cloud SIEM, InsightIDR.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (568)
Subscribers (47515)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.