Adversary simulation is a key component of a mature security program. Without it organizations might not truly understand their weaknesses until they face a real world adversary. This talk will promote the concept of the “Assumed Breach” model and discuss some steps security program owners can take to validate a security program is effective.
- Understand the benefits of adversary emulation
- Improve security detection and response capability
- How to validate that in place defenses are effective
- Constructing realistic scenarios for potential attacks
About Chris Hernandez
Chris is a Red-teamer for Target Corporation and a former pentester/red-teamer for Veris Group’s Adaptive Threat Division. Chris has experience in the defensive and offensive security space, and In his spare time he is a security researcher and bug-bounty hunter. He is currently a top host based researcher on the Synack bug bounty platform.