Knowing Your Enemy: Attack Simulation In 2020

Cyber Security Digital Summit Fall 2019

In this Cyber Security Digital Summit session, learn how to identify IT hygiene issues in real time, why Red Teams struggle to keep up and how automation can help, and what to look for in automated breach and attack simulation tools.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
November 12, 2019
01:30 PM - 02:15 PM EST

Although businesses have invested heavily in security, breaches have not been eliminated. What does it take to ensure we stay aware of our security posture? Join this session to learn how multinational companies use the latest automated attack simulation tools to know in advance what happens if they are breached.

  • How to identify IT hygiene issues in real time
  • Why Red Teams struggle to keep up and how automation can help
  • What to look for in automated breach and attack simulation tools

Gus Evangelakos, Director of Field Engineering, XM Cyber

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.