Demo - Cymulate Breach and Attack Simulation. Part 2

Logo
Presented by

Mike DeNapoli, Director, Cybersecurity Architect, Cymulate

About this talk

Extended BAS modules: WAF, Full Kill-Chain Scenarios, Data Exfiltration, and an overview of custom templates for all modules
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (118)
Subscribers (16112)
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.