See Security Optimization in Action
Join our weekly demo Thursdays at 10am PT / 1pm ET / 5pm GMT where product experts showcase key AttackIQ Security Optimization Platform features and answer questions from the live audience.
Feb. 2, 2023
Testing Your Defenses Against the Top 10 MITRE ATT&CK Techniques
The Center for Threat-Informed Defense (CTID) has recently published a methodology and calculator to help you identify the top MITRE ATT&CK techniques impacting your sector. As a founding research partner of CTID, AttackIQ has integrated these top ATT&CK techniques into our Security Optimization Platform so that organizations can select key techniques and run emulations to validate that cyberdefenses work as intended. Join us for a demonstration and to learn how to leverage this Center’s research in the AttackIQ Security Optimization Platform.
Feb. 9, 2033
Advanced Analyst Dashboarding with Jupyter Notebooks
Over the last year AttackIQ worked with our customers to develop a dynamic reporting and analysis capability in the AttackIQ Security Optimization Platform around Jupyter notebooks to analyze, visualize, report, and study security program performance. Teams can use AttackIQ’s open API with dozens of Jupyter Notebooks to automate emulation-related tasks and generate charts and graphs to help your board, C-suite, and operations teams make decisions and move forward more effectively and efficiently. Join this demo to learn how customers can make the most of AttackIQ’s Jupyter notebooks – with a focus on C-suite and board reporting.
Feb. 16, 2023
Using AttackIQ to Test Lateral Movement Techniques
Lateral movement is a critical tactic in an adversary’s kill chain with techniques that leverage common tools. Validating defenses by emulating these techniques as actors employing them to gain deeper access into a network, is part of a threat-Informed defense. Join this demo to learn about using the AttackIQ Security Optimization Platform to validate security controls with lateral movement techniques.
Feb. 23, 2023
Given the diversity and complexity that currently exists in the eCrime environment, a problem that continues to arise is: “How can we emulate a large set of adversaries in an effective and opportune manner.” For this reason, AttackIQ has decided to start a chapter of emulations that focus on those pieces of malware that act as essential commodities for the infection chains of dozens of adversaries. In this demo, join the AttackIQ Adversary Research Team (ART) to explore the in-depth research and resulting emulations of multiple long-standing malware families used and abused by multiple threats around the world.