See Security Optimization in Action

Join our weekly demo Thursdays at 10am PT / 1pm ET / 5pm GMT where product experts showcase key AttackIQ Security Optimization Platform features and answer questions from the live audience.

Oct. 06, 2022

US-CERT Alerts and AttackIQ Attack Graphs

The U.S. government has improved its alert process for emerging cyberthreats to the United States and its allies and partners globally, with the U.S. Computer Emergency Response Team (US-CERT) alert system and the MITRE ATT&CK framework at the center. In response to US-CERT alerts, AttackIQ produces comprehensive attack graphs to emulate the attacker with specificity and realism, aligned to the TTPs in the alert. In its most recent alert, the FBI and the U.S. Department of the Treasury as well as the governments of Australia, Canada, and the United Kingdom combined to urge organizations to test their security controls automatically, at scale, and in production. In this demo, join the AttackIQ Adversary Research Team to explore how AttackIQ produces attack graphs to test your controls at scale and in production, and learn how attack graphs and assessments can help you optimize your security program performance.


Oct. 13, 2022

Automated Testing and Cloud Security: Azure and AWS

The advent of cloud technologies has changed everything about how networks are built and operated. Infrastructure, policy, and configuration can all now exist as code. Cloud technologies can be deployed quickly, updates and integrations can occur automatically, and services can scale rapidly across geographies. The cloud era demands new approaches to security. Join this demo to learn about new cloud security features in the AttackIQ Security Optimization Platform and how you can maximize your security program effectiveness with AttackIQ and MITRE ATT&CK.


Oct. 20, 2022

C-Suite and Board Reporting with Jupyter Notebooks

Over the last year AttackIQ worked with its customers to develop a dynamic reporting and analysis capability in the AttackIQ Security Optimization Platform around Jupyter notebooks to analyze, visualize, report, and study security program performance. Teams can use AttackIQ’s open API with dozens of Jupyter Notebooks to automate emulation-related tasks and generate charts and graphs to help your board, C-suite, and operations teams make decisions and move forward more effectively and efficiently. Join this demo to learn how customers can make the most of AttackIQ’s Jupyter notebooks – with a focus on C-suite and board reporting.


Oct. 27, 2022

The Seven Deadly Techniques and Ending the Era of Security Control Failure

In September, 2022, after months of research and analysis, AttackIQ released a data study report focused on historic security control failures against top MITRE ATT&CK techniques that have historic and significant impacts (to include Russian operations in Ukraine). To understand the degree of security effectiveness within our customer base, we anonymized customer data from over 120 SaaS cloud customers and their endpoint detection and response (EDR) security controls performance in 2021. Join us to understand the techniques that comprise the “Seven Deadly Techniques”, why security programs are failing, and how you can elevate your security program performance.

Register Today!

By submitting this form you indicate that you have read and agree to the terms of our Privacy Policy.