Adversary simulation, emulation or purple teaming - How would you define it?

By Anant Shrivastava , Vincent Yiu , Martin Ingesen , Jean Marie Bourbon , Samuel Kimmons , Joe Vest on 06 Aug 2021 @ Defcon : Adversary Village
πŸ“Ή Video πŸ”— Link
#security-testing #incident-management #red-teaming #threat-modeling #security-strategy #purpleteam
Focus Areas: βš–οΈ Governance, Risk & Compliance , πŸ›‘οΈ Security Operations & Defense , πŸ” Application Security , βš™οΈ DevSecOps , 🚨 Incident Response , 🎯 Penetration Testing , πŸ—οΈ Security Architecture

Presentation Material

AI Generated Summary

This talk focused on the concepts of adversary simulation, emulation, and purple teaming in the context of security testing. The panelists discussed their definitions and understandings of these terms, highlighting the importance of threat perspective and the need for education in the security industry. Key findings included the distinction between simulation, which involves simulating the goals of a threat actor, and emulation, which involves emulating specific tactics, techniques, and procedures (TTPs). The panelists also emphasized the importance of maturity level in determining the effectiveness of these types of engagements.

The panelists presented various techniques for conducting these engagements, including tabletop exercises and threat scenario walkthroughs. They also discussed the importance of response and reaction in the face of a real-life attack, highlighting the need for processes and training to be in place. The conversation also touched on the challenge of convincing leadership to invest in security testing, with the panelists suggesting that education and threat perspective are key to making a compelling case.

Practical implications of the talk include the need for organizations to prioritize security testing and to invest in education and training for their security teams. The panelists also emphasized the importance of understanding the threat landscape and the need for a proactive approach to security, rather than simply relying on prevention and patch management. Overall, the talk highlighted the complexity and nuance of security testing and the need for a thoughtful and informed approach to these types of engagements.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.