The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
About this talk
Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness
With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.
In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.
● October 19, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
● October 26, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
● November 2, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
● November 9, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation
Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.…