Saltt Technologies Webinar: Thinking Like An Attacker

Logo
Presented by

Mike DeNapoli, Cybersecurity Architect, Cymulate

About this talk

From military exercises to politics to video games, whenever there is any form of formal conflict, teams get stronger when they understand how the other side operates – their strategies, tactics, and core strengths. This session will give blue team members information and tips and tricks for breaking out of the confines of defensive thinking to better visualize and simulate threat activity from the threat actor point of view. - High-level review of how threat actors tend to operate - Visualization of infrastructure and systems as seen by a threat actor - Differences between different types of threat actors (lone wolves, small gangs, organized groups, state sponsored activity, etc.) - Myths of how threat activity happens commonly held by defenders
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (129)
Subscribers (16785)
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.