Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness
Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
About this talk
With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.
In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.
● June 9, 2021 at 1PM ET: Part 1 | The Importance of Threat Intelligence and Adversary Knowledge to Prioritize Risks
● June 16, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
● June 23, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
● June 30, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation
Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".