![51a3cb9e 71c8 459f 83fc b3fd8cd5384b Coalfire Thumbnail Datasheet App Sec Assessment 814x460 FINAL](/assets/imager/images/34189/51a3cb9e-71c8-459f-83fc-b3fd8cd5384b-Coalfire_Thumbnail_Datasheet_AppSecAssessment_814x460_FINAL_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/34189/51a3cb9e-71c8-459f-83fc-b3fd8cd5384b-Coalfire_Thumbnail_Datasheet_AppSecAssessment_814x460_FINAL_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/34189/51a3cb9e-71c8-459f-83fc-b3fd8cd5384b-Coalfire_Thumbnail_Datasheet_AppSecAssessment_814x460_FINAL_ab829ea53212f9b25775984a19e3b3e7.png 600w, /assets/imager/images/34189/51a3cb9e-71c8-459f-83fc-b3fd8cd5384b-Coalfire_Thumbnail_Datasheet_AppSecAssessment_814x460_FINAL_3716995d9d06fee3d3978a9e9740aa24.png 613w)
Webinar
Threat-Informed Defense: Using Adversary Emulation to Validate and Improve your Cybersecurity
April 26, 2023
![Webinar Images threat informed defense](/assets/imager/images/32332/Webinar-Images-threat-informed-defense_98edf1443e0d9b3e52b3d719c6b1d6f9.jpg 300w, /assets/imager/images/32332/Webinar-Images-threat-informed-defense_165059becc3e0edd115b9e109c59d8ec.jpg 600w, /assets/imager/images/32332/Webinar-Images-threat-informed-defense_4be728a53ab8953813124ff77c2a3e8c.jpg 814w)
Adversary emulation is an intelligence driven discipline that entails researching, modeling, and executing cyber adversary tactics, techniques, and procedures to assess and improve cybersecurity.
This webinar discusses the key attributes and Coalfire’s approach to delivering adversary emulation engagements, with perspectives from red team and blue team experts.
What you will learn in this session:
- The difference between threat modeling and adversary simulation
- The value of adversary simulation as part of a threat-informed defense
- What you should expect from your pen testing team during an adversary emulation exercise
- When adversary emulation may not be the right approach
Fill out the form below to access the webinar: