See Security Optimization in Action

Join our weekly demo Thursdays at 10am PT / 1pm ET / 5pm GMT where product experts showcase key AttackIQ Security Optimization Platform features and answer questions from the live audience.

July 7, 2022

Operationalize Your Security Program with MITRE ATT&CK

Whether your organization has a small security team with limited resources or a more mature enterprise program, the MITRE ATT&CK framework is an invaluable resource that will help you understand adversary tactics and techniques so that you can plan against them. Join this demo to learn how breach and attack simulation through the AttackIQ Security Optimization Platform enables you to effectively operationalize the MITRE ATT&CK framework.

July 14, 2022

Purple Teaming with MITRE ATT&CK in the Oil and Gas Sector: MuddyWater and OilRig/APT34

Cyberattacks have increased significantly against the energy sector as geopolitical tensions have risen, and nation-state-sponsored espionage groups have focused their attacks on oil, gas, and electric companies for over a decade. MuddyWater and OilRig are Iran-based nation-state sponsored intrusion sets that have targeted organizations globally but have the heaviest focus on other nations in the Middle East. MuddyWater has focused targeting on energy (oil), telecommunications and government IT services sectors, while OilRig/APT34 has targeted a variety of sectors beyond just energy, to include financial, government, chemical, and telecommunications. This demo will include a technical overview of campaigns from both intrusion sets. Join AttackIQ researchers and experts to explore how these adversary campaign emulation attack graphs in the AttackIQ Security Optimization Platform can help you validate your security effectiveness against real-world campaigns from these adversaries.

July 21, 2022

Responding to Emerging Threats: US-CERT and AttackIQ Attack Graphs

The U.S. government has improved its alert process for emerging cyberthreats to the United States and its allies and partners around the world, with the U.S. Computer Emergency Response Team (US-CERT) alert system and the MITRE ATT&CK framework at the center. In response to a new threat, US-CERT uses MITRE ATT&CK to describe observed adversary tactics, techniques, and procedures (TTPs), and following a US-CERT alert, AttackIQ produces comprehensive attack graphs to emulate the attacker with specificity and realism, aligned to the TTPs in the alert. In this demo, join the AttackIQ Adversary Research Team to explore how AttackIQ produces attack graphs and learn how attack graphs can help optimize your cybersecurity readiness and effectiveness.

July 28, 2022

Testing your defenses against the Top Ten MITRE ATT&CK Techniques

The Center for Threat-Informed Defense recently published a methodology and calculator so that you can identify the top MITRE ATT&CK techniques that impact your sector. As a founding research partner of the Center for Threat-Informed Defense, AttackIQ has integrated the top ATT&CK techniques into the AttackIQ Security Optimization Platform for organizations to select key techniques and run adversary emulations to validate that your cyberdefenses work as intended. Join AttackIQ experts in this demo to see how to leverage this new research and the Security Optimization Platform. For more about the project, see the Center report here.

Register Today!

By submitting this form you indicate that you have read and agree to the terms of our Privacy Policy.