The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks

Logo
Presented by

Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation

About this talk

Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver. In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform. You’ll learn: ● June 9, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks ● June 16, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte ● June 23, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK ● June 30, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (367)
Subscribers (119771)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.