What You Need to Know Before
You Start

Starts 3 July 2025 04:47

Ends 3 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Becoming a Dark Knight - Adversary Emulation Demonstration for ATT&CK Evaluations

Join us for an engaging session on adversary emulation within cybersecurity. Learn valuable techniques to analyze sophisticated threats and develop intricate scenarios to test and strengthen security protocols. This demonstration is part of the MITRE ATT&CK Evaluations, a renowned framework for improving cybersecurity defenses across industri.
Black Hat via YouTube

Black Hat

2765 Courses


43 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join us for an engaging session on adversary emulation within cybersecurity. Learn valuable techniques to analyze sophisticated threats and develop intricate scenarios to test and strengthen security protocols.

This demonstration is part of the MITRE ATT&CK Evaluations, a renowned framework for improving cybersecurity defenses across industries.

Whether you're a professional seeking to deepen your understanding of threat emulation or looking to enhance your skills in cybersecurity defense, this event provides practical insights and strategies. Discover how to effectively execute operations that can fortify your organization's defense mechanisms against evolving cyber threats.

This session is available on YouTube, underlining its accessibility to a wide audience interested in advanced cybersecurity practices.

Enhance your knowledge in artificial intelligence and participate in conference-quality talks designed to challenge and grow your cybersecurity expertise.

Syllabus

  • Introduction to Adversary Emulation
  • Definition and importance in cybersecurity
    Overview of MITRE ATT&CK Framework
    Key objectives and outcomes of adversary emulation
  • Understanding Advanced Threats
  • Types of advanced threats and APTs (Advanced Persistent Threats)
    Case studies and historical analyses
    Identifying threat actors and their techniques
  • The MITRE ATT&CK Framework in Detail
  • Structure and components of ATT&CK
    Use cases for ATT&CK in adversary emulation
    Mapping adversary behavior to ATT&CK tactics and techniques
  • Developing Emulation Scenarios
  • Creating realistic threat scenarios
    Selection of tools and techniques for scenario development
    Risk assessment and prioritizing threats
  • Planning and Execution of Emulation Operations
  • Building an emulation plan
    Execution of operations within a controlled environment
    Use of red teaming tools and platforms
  • Measuring and Improving Defenses
  • Monitoring and detection during emulation activities
    Reporting findings from ATT&CK Evaluations
    Incorporating results into security strategy and posture
  • Legal and Ethical Considerations
  • Guidelines for ethical operation of adversary emulations
    Compliance with legal frameworks and organizational policies
  • Hands-on Labs and Simulations
  • Practical exercises with threat emulation tools
    Simulated attack scenarios and defenses testing
    Collaborative projects to develop custom emulation scenarios
  • Review and Continuous Learning
  • Evaluating the effectiveness of emulation activities
    Resources for staying updated with emerging threats and techniques
    Building a community of practice around adversary emulation
  • Conclusion and Future Directions
  • Summary of key learnings
    Future of adversary emulation in cybersecurity
    Career opportunities and path forward in threat intelligence and emulation

Subjects

Conference Talks