Adversary Emulation or How I Learned to Stop Being Polite and Get Real Results | Adam & Katie
Wild West Hackin' Fest Wild West Hackin' Fest
52.9K subscribers
891 views
0

 Published On Aug 11, 2023

Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Adversary emulation has become the go-to testing approach, and for good reason. By acting like real adversaries, red teams can provide effective testing to ensure enterprises detect and respond the way they want to. But there’s a problem—this sounds great in theory, but it often isn’t happening in practice. Using data from real intrusions, this talk will demonstrate how differently testers and real adversaries behave and explain why this can lead to a false sense of security. The presenters will share examples of different techniques, procedures, and tools used by testers and adversaries, including how detecting these differs. The presenters will also break down a spectrum of adversaries, providing the audience with a crawl, walk, run approach to adverary emulation to enable organizations of various capabilities. The audience will learn not only how adversary emulation is often falling short, but more importantly, how to improve testing to achieve better security outcomes.

Adam Mashinchi is the Principal Product Manager for Managed Detection and Response at Red Canary. Before Red Canary, Adam defined and managed the development of enterprise security and privacy solutions with an emphasis on adversary emulation and usable encryption at a global scale, leading numerous technical integration projects with a variety of partners and services.Katie Nickels
Katie is the Director of Intelligence for Red Canary as well as a SANS Certified Instructor for FOR578: Cyber Threat Intelligence and a non-resident Senior Fellow for the Atlantic Council’s Cyber Statecraft Initiative. She has worked on cyber threat intelligence (CTI), network defense, and incident response for over a decade for the U.S. DoD, MITRE, Raytheon, and ManTech. Katie hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. Katie has shared her expertise with presentations, webcasts, podcasts, and blog posts, including her monthly livestream, the SANS Threat Analysis Rundown, as well as her personal blog, Katie’s Five Cents. She has received multiple awards, including recognition by SC Media as a Women in IT Security Advocate as well as the SANS Difference Maker Award and the President’s Award from the Women’s Society of Cyberjutsu.

///Black Hills Infosec Socials
Twitter:   / bhinfosecurity  
Mastodon: https://infosec.exchange/@blackhillsi...
LinkedIn:   / antisyphon-training  
Discord:   / discord  

///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.mysh...

///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/ser...
Penetration Testing: https://www.blackhillsinfosec.com/ser...
Incident Response: https://www.blackhillsinfosec.com/ser...

///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/

///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pa...
Live Training: https://www.antisyphontraining.com/co...
On Demand Training: https://www.antisyphontraining.com/on...
Antisyphon Discord:   / discord  
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Trai...

///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube:    / wildwesthackinfest  
Antisyphon Training YouTube:    / antisyphontraining  
Active Countermeasures YouTube:    / activecountermeasures  
Threat Hunter Community Discord:   / discord  

show more

Share/Embed