How to maximize Microsoft Defender ATP configuration using Attack Simulations

Presented by

Hadar Feldman, Sr. Program Manager/Security Researcher, Microsoft and Valeriy Leykin, Director Product Management, SafeBreach

About this talk

For security teams, it’s critical to validate the efficacy of endpoint security against leading threats in real-world scenarios. In the Microsoft Defender Advanced Threat Protection (ATP) evaluation lab, security practitioners can take advantage of a select set of breach and attack methods from the extensive SafeBreach Hackers Playbook (™). As a result, they can immediately and accurately test endpoint security capabilities against multiple real-life attack playbooks favored by very active Advanced Persistent Threat groups. In this webinar, security experts from both companies explain how the integration of SafeBreach and Microsoft Defender ATP evaluation lab works and how security teams can verify that their Microsoft Defender ATP configuration will be successful in blocking relevant attacks. You will learn: - How breach and attack simulations identify security weaknesses that might allow malware infection, credential theft, data collection, ransomware, modification of registry keys, and malicious OS configurations - How to use the Evaluation Lab / SafeBreach integration to build and run proofs of concept in a virtual environment using real attack scenarios - How to evaluate attack simulation results and make appropriate remediations - How to explore the many other breach and attack methods in the SafeBreach Hacker's Playbook (™), MITRE heat mapping and more.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (31)
Subscribers (1599)
SafeBreach is a leader in breach and attack simulation. The company’s groundbreaking patented platform provides a “hacker’s view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve security operations center (SOC) analyst response. SafeBreach automatically executes thousands of breach methods from its extensive and growing Hacker’s Playbook™ of research and real-world investigative data.