From military exercises to politics to video games, whenever there is any form of formal conflict, teams get stronger when they understand how the other side operates – their strategies, tactics, and core strengths.
This webinar gives blue team members information and tips and tricks for breaking out of the confines of defensive thinking to better visualize and simulate threat activity from the threat actor’s point of view.
- High-level review of how threat actors tend to operate
- Visualization of infrastructure and systems as seen by a threat actor
- Differences between different types of threat actors (lone wolves, small gangs, organized groups, state-sponsored activity, etc.)
- Commonly-held myths of how threat activity happens