Hadar Feldman, Sr. Program Manager/Security Researcher, Microsoft and Valeriy Leykin, Director Product Management, SafeBreach
For security teams, it’s critical to validate the efficacy of endpoint security against leading threats in real-world scenarios. In the Microsoft Defender Advanced Threat Protection (ATP) evaluation lab, security practitioners can take advantage of a select set of breach and attack methods from the extensive SafeBreach Hackers Playbook (™). As a result, they can immediately and accurately test endpoint security capabilities against multiple real-life attack playbooks favored by very active Advanced Persistent Threat groups.
In this webinar, security experts from both companies explain how the integration of SafeBreach and Microsoft Defender ATP evaluation lab works and how security teams can verify that their Microsoft Defender ATP configuration will be successful in blocking relevant attacks.
You will learn:
- How breach and attack simulations identify security weaknesses that might allow malware infection,
credential theft, data collection, ransomware, modification of registry keys, and malicious OS
- How to use the Evaluation Lab / SafeBreach integration to build and run proofs of concept in a
virtual environment using real attack scenarios
- How to evaluate attack simulation results and make appropriate remediations
- How to explore the many other breach and attack methods in the SafeBreach Hacker's Playbook
(™), MITRE heat mapping and more.