[Webcast] Red vs. Blue: Using Attack Simulation to Detect Stealthy Techniques

 
 
Rapid7
 

Join our webcast Tuesday, June 18th at 3 pm BST / 4 pm CEST

 

Red vs. Blue: Using Attack Simulation to Detect Stealthy Techniques

 
 
 
 
 
 

Nearly every security product on the market today will help you "detect threats". But, how do you know if your tools are working well, and where to invest next?

We believe the answer lies at the intersection of proactive threat modeling and consistent attack simulation. If you can model and predict the types of attacks you'll face (e.g. phishing, insider threat, DDOS), then your monitoring efforts can focus on the key techniques that power the attack (e.g. Powershell commands are used by attackers to evade AV & whitelisting defenses).

 
 
 

If you'd like a refresher on the top threats facing industries today, and how penetration testers and attackers alike move through a network, this special webcast is for you. Come see:

  • The core techniques that penetration testers & attackers use alike
  • How blue teams are monitoring for these stealthy behaviors
  • Why teams are turning to cloud-scale security analytics

This webcast will include footage of Metasploit, common attacker techniques, and our cloud SIEM, InsightIDR. Register today to save your spot!

 
 
 
 
©Rapid7
 

To unsubscribe, click here.

Комментарии

HTML/JavaScript

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer posuere erat a ante.

HTML/JavaScript

Etiam porta sem malesuada magna mollis euismod. Cras mattis consectetur purus sit amet fermentum. Aenean lacinia bibendum nulla sed consectetur.

HTML/JavaScript

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer posuere erat a ante.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer posuere erat a ante.