9:50 AM - 10:10 AM (PDT)
You Want Us to Emulate What!?!

See adversary emulate adversary, right? We very often follow this pattern, especially as new threats emerge, but is there a better way?

In this talk, we will explore not only how to select better emulation targets (groups, malware, techniques), but also how proper planning can help ensure that the adversary emulation plans we build are providing real value to defenders.

Session Resource: https://github.com/center-for-threat-informed-defense/adversary_emulation_library

Session Survey