Header of RedMimicry GmbH

Realistic Breach Emulation with RedMimicry

This impulse shows how to simulate realistic cyber attacks using RedMimicry to verify defense systems and processes.

Topic

Endpoint ProtectionSIEM / Threat Analytics / SOC

When & Where

calendar_month

Tue, 10/22/2024, 16:10 - 16:20

location_on

Forum, Booth 6-235

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

The complexity and costs of cyber defense systems and processes are steadily increasing. Systems such as EDR, NDR, and SIEM, as well as SOAR and SOC teams, are integral components of modern security architectures. However, many companies only recognize the true performance and potential weaknesses of these systems after an attack. With RedMimicry, you have the opportunity to proactively test your security landscape. RedMimicry emulates malware modeled after real threat groups like Lockbit. In this impulse, we will demonstrate how RedMimicry can be effectively used to assess IT security landscapes.

Moderator