threat focused purple team exercises (non active directory edition)
Published 2 years ago • 1.4K plays • Length 32:55Download video MP4
Download video MP3
Similar videos
-
36:45
the active directory purple team playbook
-
58:00
operationalized purple teaming
-
1:00:57
running your first purple team exercise - understand the cyber kill chain, emulation, & response
-
32:15
purple team war stories
-
36:15
purple team feedback loop
-
27:42
in the trenches: purple team do’s and don’ts
-
44:46
red team operations: attack and think like a criminal
-
6:10
purple teaming explained
-
1:39:03
red blue, how purple are you? identifying gaps in the spectrum of security
-
32:08
designing playbooks with purple team approach
-
36:56
purple wars: episode ii - attack of the emulators
-
36:25
high value adversary emulations via in person purple team exercises
-
40:15
advanced purple teaming
-
28:17
purple team pirs: what adversary emulations need from cyber threat intelligence
-
55:08
threat-informed detection engineering
-
41:38
purple teaming in an enterprise: why, who, when, and how
-
32:21
purple chaos - dos and don’ts of the game
-
37:46
purple teaming cloud identity: simulation labs for red and blue teams
-
41:13
maximizing the value of attack detection tooling with atomic purple teaming