Posted on
in Presentations
Adversary emulation is a go-to testing approach. By acting like real adversaries, red teams can provide effective testing for threats detection. But there's a problem—this isn't happening in practice. Using data from real intrusions, this talk will show how differently testers and real adversaries behave, with examples of different techniques, procedures, and tools used by testers and adversaries.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community