The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks

Logo
Presented by

Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation

About this talk

Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver. In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform. You’ll learn: ● October 19, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks ● October 26, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte ● November 2, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK ● November 9, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (399)
Subscribers (82381)
Mandiant provides public and private organizations and critical infrastructure worldwide with early threat insights through unmatched intelligence and response expertise for the highest-profile incidents.