The heroes of cybersecurity fight an asymmetric war every day. They face difficult odds—too many security products, too many alerts, too complex environments. Meanwhile, the cybersecurity villains need to find only one seam in the firewall or one moment of human weakness to find a way in. But what if heroes could play the villain and simulate the adversary? What if we could get ahead of the breach by challenging our defenses with the same techniques hackers use? What if we could do this safely and continuously?
In this session, we will explore an emerging technology called Breach and Attack Simulation that safely simulates hacker breach methods to validate controls. We’ll provide a deep-dive into what it is, how it works and the use cases that make sense for SOC and incident response teams.
- Understand how hackers think and operate.
- The reasons that breach and attack simulation challenges defenses to quantify risks.
- Why breach and attack simulation help SOC teams to be proactive.
About Itzik Kotler

Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA Europe, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security-Art, an information security consulting firm, and before that he was SOC Team Leader at Radware (NASDQ: RDWR). Follow him on Twitter at @itzikkotler.