Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of RedMimicry GmbH
Forums it-sa Expo Knowledge Forum B

Realistic Breach Emulation with RedMimicry

This impulse shows how to simulate realistic cyber attacks using RedMimicry to verify defense systems and processes.

calendar_today Tue, 22.10.2024, 16:10 - 16:20

event_available On site

place Forum, Booth 6-235

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Endpoint Protection SIEM / Threat Analytics / SOC

Key Facts

  • StealBit transfers data insecurely
  • Attackers have issues with technical debt

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

The complexity and costs of cyber defense systems and processes are steadily increasing. Systems such as EDR, NDR, and SIEM, as well as SOAR and SOC teams, are integral components of modern security architectures. However, many companies only recognize the true performance and potential weaknesses of these systems after an attack. With RedMimicry, you have the opportunity to proactively test your security landscape. RedMimicry emulates malware modeled after real threat groups like Lockbit. In this impulse, we will demonstrate how RedMimicry can be effectively used to assess IT security landscapes. ... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.