Videos

  • Cyber Security Hub

    Ransomware and criminal cyberthreats: How to counter using MITRE ATT&CK

    Find out how to use a threat-informed defense approach to cyber security with MITRE ATT&CK

  • Cybersnacks

    Cybersnacks, Ep. 7: The 3 Most Consequential Cyberattacks of 2021

    From the Colonial Pipeline to log4j, 2021 kept security teams busy protecting their organizations. Watch for a recap of 2021.

  • Seeing the Forest for the shiny new threat trees

    Video: Seeing the Forest for the Shiny New Threat Trees

    In this entertaining, brief chat, learn more about threat intelligence and how to design a threat emulation plan that works.

  • Cybersnacks

    3 Ways to Integrate Good Testing into Your Cybersecurity Program

    Grab your favorite snack and spend 10 minutes with AttackIQ’s Ben Opel learning how to get operationally relevant results from testing properly.

  • Jose Barajas

    Defcon 29 Panel Discussion: Is Adversary Emulation Too ___ For You?

    Watch this panel of experts chat about some common roadblocks to implementing adversary emulation.

  • What is the AttackIQ Security Optimization Platform?

    Learn the basics about AttackIQ’s Security Optimization Platform.

  • Cybersnacks, Episode 5: Network Control Validation (NCV) Module

    Grab a snack and spend 15 minutes learning about AttackIQ’s Network Control Validation (NCV) Module.

  • Conversations with an AttackIQ Academy student: Ryan Williams

    Ben Opel interviews Ryan on his shift into cybersecurity, what makes Academy different, and hacking The Gibson.

  • Cybersnacks, Episode 4: AttackIQ Anatomic Engine

    Grab a snack and spend five minutes learning how Attack Flows emulate comprehensive, multi-stage cyberattacks.

  • Cybersnacks, Episode 3: MITRE ATT&CK and NIST 800-53

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Cybersnacks, Episode 2: Microsoft Defender ATP

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.

  • Cybersnacks, Episode 1: AttackIQ + MITRE ATT&CK

    Security teams are drowning in alerts and still missing what matters. Join us to learn how to operationalize Continuous Threat Exposure Management (CTEM)—prioritizing real risks, aligning teams and tools, and validating defenses with attacker-informed insights.