Find out how to use a threat-informed defense approach to cyber security with MITRE ATT&CK
From the Colonial Pipeline to log4j, 2021 kept security teams busy protecting their organizations. Watch for a recap of 2021.
In this entertaining, brief chat, learn more about threat intelligence and how to design a threat emulation plan that works.
Grab your favorite snack and spend 10 minutes with AttackIQ’s Ben Opel learning how to get operationally relevant results from testing properly.
Watch this panel of experts chat about some common roadblocks to implementing adversary emulation.
Learn the basics about AttackIQ’s Security Optimization Platform.
Grab a snack and spend 15 minutes learning about AttackIQ’s Network Control Validation (NCV) Module.
Ben Opel interviews Ryan on his shift into cybersecurity, what makes Academy different, and hacking The Gibson.
Grab a snack and spend five minutes learning how Attack Flows emulate comprehensive, multi-stage cyberattacks.