See Security Optimization in Action
Join Us for an Upcoming Demo
Join our weekly demo where product experts showcase key AttackIQ security Optimization Platform features and answer questions from the live audience.
Learn how to easily and continuously increase efficiency and effectiveness across your security organization during our weekly demos on Thursdays at 10:00 AM PT / 13:00 PM ET / 18:00 PM GMT.
Experts will guide you through how the AttackIQ platform:
- Measures and validates your detection and prevention capabilities
- Identifies gaps that require remediation
- Prioritizes the use of valuable resources
- Generates detailed readiness reports for executives, boards, and compliance requirements
The live product demos include:
- Experiencing AttackIQ’s user interface
- Setting up and running attack emulations at scale and in production
- How to leverage industry frameworks like MITRE ATT&CK
- Integrations with existing security controls, including SIEMs
- How to run and use reports
Upcoming Webinars and Demos
Sep. 23, 2021
AttackIQ Product Overview
During this demo, AttackIQ product experts will walk you through the ins and outs of the platform covering key topics such as:
- How to measure and validate your detection and prevention capabilities,
- Identify gaps that require remediation, prioritize the use of valuable resources,
- And generate detailed readiness reports for executives, boards, and compliance requirements.
On-Demand Special Focus Demos
Securing Your Azure Cloud with MITRE ATT&CK
MITRE Engenuity’s Center for Threat-Informed Defense recently released research on cloud native controls capabilities and the MITRE ATT&CK techniques it provides coverage for. Join us for a special demo where we will deep dive into the research done by the Center the Security Stack Mappings, and how you are able to start securing your Azure environment today!
Purple Teaming in the Cloud with ATT&CK
Organizations have moved rapidly to the cloud without a commensurate strategy for securing it. On the basis of innovative research from MITRE Engenuity’s Center for Threat-Informed Defense, cybersecurity teams can now leverage the ATT&CK framework against security controls within Azure to optimize cloud security effectiveness. In this expert-led webinar and with the new Dummies Guide to Purple Teaming, you will learn to use the ATT&CK framework and purple team operations to validate cloud security effectiveness.
Ransomware in 2021
Staying Abreast of Modern Attacks
Ransomware attacks are on the rise with new victims in the news every day. Disrupting the price of gas and rattling American society, the Colonial Pipeline Co. shows how ransomware attacks can have far-reaching socio-political effects. The commodification of ransomware has enabled criminals all over the globe, and some nation-states give them safe harbor while others struggle to root out criminals despite their best intentions. How can security leaders best plan for the increasing proliferation and use of ransomware? Join Maggie MacAlpine and Jonathan Reiber, two seasoned cybersecurity strategists, for a webinar discussion on what the latest threats are and how you can best protect your organization from ransomware attacks.
Uniting Threat and Risk Management with NIST 800-53 & MITRE ATT&CK
During this weekly demo, we will introduce you to the history and evolution of the MITRE ATT&CK framework, the revolutionary compilation of known adversarial techniques, tactics, and common knowledge. Additionally, we will highlight why organizations are adopting it and how organizations can use MITRE ATT&CK to improve their security effectiveness, strengthen their cybersecurity program, and maximize resources. We will also cover how to map NIST SP 800-53 Control-to-ATT&CK mappings to satisfy compliance checks from a threat informed perspective and begin making data-driven decisions to inherently reduce risk.
New AttackIQ Platform Innovations: Comprehensive Adversary Emulation
Check out what’s new in AttackIQ! With our latest platform innovations, we’re delivering the most comprehensive adversary emulation capabilities available, completely aligned to MITRE ATT&CK. See how easy it is to evaluate the performance of network-deployed security controls with prescriptive guidance and maximize your investment in controls like next-generation firewalls (NGFW.) Learn how operators of all skill levels can apply complex adversary behaviors to their testing programs. See how to create full emulation campaigns with point-and-click ease of use.
Automated Testing and ServiceNow Security Validation
If you’re a ServiceNow customer, you won’t want to miss this weekly demo where our cybersecurity experts show you how to validate that security alerts are firing properly to inform your Security Operations Center and keep your organization secure. You’ll learn how to integrate the AttackIQ Security Optimization Platform with ServiceNow to continuously test the alert process and identify security gaps before adversaries can exploit them.
Aligning MITRE ATT&CK to NIST 800-53
AttackIQ’s Security Optimization Platform is now able to deploy ATT&CK-aligned scenarios against an organization’s security controls, validating control effectiveness in context of the NIST 800-53r4 controls. As a result, red, blue and white teams each can play a part in compliance mapping and enforcement, and the Security Optimization Platform helps each team perform its roles and responsibilities. See how to move beyond compliance and deliver measurable improvement of your security posture.
AttackIQ + Microsoft Integration
See how you can strengthen cyber threat detection and investigation, plus provide continuous visibility and control over the security of your endpoints. We’ll show you how to use Microsoft® Azure Sentinel and Microsoft® Defender Advanced Threat Protection (ATP) against the tactic categories as outlined by MITRE ATT&CK with the AttackIQ platform.
AttackIQ + Splunk SIEM Integration
Learn how to use the AttackIQ Security Optimization Platform to test controls at scale and in production in order to find and remediate gaps that could be compromised by adversaries. In this special focus demo, we’ll show you how to confirm that forwarding mechanisms are functioning with the Splunk SIEM and that alerts are being triggered in order to properly flag suspicious behavior to analysts. See how easy it is to integrate the two platforms using an open API.