Threat emulation is the art of replicating real-world threats and their various behaviors to test an organization's security posture. It involves creating Intelligence-driven scenarios designed to mimic real-world threats. We are not just checking the box against different ATT&CK techniques but emulating a full attack chain.
By emulating these campaigns, organizations can measure and manage exposure, validate security tooling and procedures, improve incident response, enhance security measures, and ensure robust and effective controls are in place.
Students will walk away with:
An understanding of Threat Emulation (TE) and how it can help improve your security posture
How to utilize the Threat Emulation process
Getting started with free tooling and capability sets
How to perform Gap analysis and validate your detections
Tips and tricks to help you be the most effective Threat Emulator possible!
* Please note: This is not included in the Main Conference registration and requires a separate registration.