Featured
Red Teaming – Automate What You Can
Mike DeNapoli, Director, Cybersecurity Architect at Cymulate
Red teaming is a complex operation that is highly specific to the individual environment(s) in which each exercise is run. A single wrong move can have significant impact on business operations and revenue generation, or produce misleading or incorrect results or both. In order to avoid these negative outcomes, many organizations automation have limited the use of automation in red team operations. However, modern tools and platforms can be used successfully and safely to automate many components of red team operations, such as discovery and probing, without incurring risk. This allows the red team staffers to accomplish more with the same number of people and still reduce the rate of burnout common to the industry. This webinar will speak to methods which can be used to safely automate major components of red team exercises without incurring risk, while still seamlessly integrating into the manual operational phase of the exercises themselves.
All episodes
-
Think Like an Attacker
Mike DeNapoli, Director, Cybersecurity Architect at Cymulate
From military exercises to politics to video games, whenever there is any form of formal conflict, teams get stronger when they understand how the other side operates – their strategies, tactics, and core strengths.
This session will give blue team members information and tips and tricks for breaking out of the confines of defensive thinking to better visualize and simulate threat activity from the threat actor point of view.
- High-level review of how threat actors tend to operate
- Visualization of infrastructure and systems as seen by a threat actor
- Differences between different types of threat actors (lone wolves, small gangs, organized groups, state sponsored activity, etc.)
- Myths of how threat activity happens commonly held by defenders -
Overwhelmed by the Sheer Number of Security Tools?
Mike DeNapoli, Director, Cybersecurity Architect at Cymulate
“The Bake It Off” Webinar Builds a New Level of Trust With Security Product Evaluation Through Attack Simulation.
What’s the count on your security tool choices?
No single person could inspect all of them and make an informed choice about which tool is the best for their organization.
The Bake it Off webinar walks you through independent assessments with Breach and Attack Simulation (BAS) that works with your time, budget, and team right now.
Put your tools to the test within your production environment to see how they react to simulated attacks.
Watch how to use BAS for a fair and targeted bake-off that validates each tool that meets your needs.
-
Five Questions to Ask as You Evolve Threat Exposure Management
Mike DeNapoli, Cybersecurity Architect @Cymulate
As the knowledge and expertise of an organization’s cybersecurity people, process, and technology evolves, keeping these questions in mind can be a major help to keeping that growth on track:
1 – Where are we at this point in our cybersecurity maturity?
2 – Where can we move to proactivity without sacrificing reactivity?
3 – How can we more fully integrate business leadership into the cybersecurity process?
4 – What challenges and roadblocks are continuing to surface?
5 – What should be integrated into the next cycle of review and action? -
Urgency vs Priority in Vulnerability Management
Mike DeNapoli, Director, Cybersecurity Architect at Cymulate
With hundreds of thousands of potential vulnerabilities to be dealt with at any time, how can organizations define which should be addressed first? This webinar will provide guidance and ideas on how to gauge not only the priority of patching and upgrading, but also to map out the urgency of performing those remediation actions – and how these may be two extremely different things for each vulnerability discovered.
-
Red Teaming – Automate What You Can
Mike DeNapoli, Director, Cybersecurity Architect at Cymulate
Red teaming is a complex operation that is highly specific to the individual environment(s) in which each exercise is run. A single wrong move can have significant impact on business operations and revenue generation, or produce misleading or incorrect results or both. In order to avoid these negative outcomes, many organizations automation have limited the use of automation in red team operations. However, modern tools and platforms can be used successfully and safely to automate many components of red team operations, such as discovery and probing, without incurring risk. This allows the red team staffers to accomplish more with the same number of people and still reduce the rate of burnout common to the industry. This webinar will speak to methods which can be used to safely automate major components of red team exercises without incurring risk, while still seamlessly integrating into the manual operational phase of the exercises themselves.