Reader small image

You're reading from  Practical Threat Intelligence and Data-Driven Threat Hunting

Product typeBook
Published inFeb 2021
PublisherPackt
ISBN-139781838556372
Edition1st Edition
Right arrow
Author (1)
Valentina Costa-Gazcón
Valentina Costa-Gazcón
author image
Valentina Costa-Gazcón

Valentina Costa-Gazcón is a cyber threat intelligence analyst who specializes in tracking Advanced Persistent Threats (APTs) worldwide, using the MITRE ATT&CK Framework to analyze their tools, tactics, techniques, and procedures (TTPs). She is a self-taught developer and threat hunter with a degree in translation and interpretation from the Universidad de Málaga (UMA) and a cyber security diploma from Argentina's Universidad Tecnológica Nacional (UTN). Valentina also is one of the founders of the BlueSpace community (BlueSpaceSec) and one of the core members of Open Threat Research, founded by Roberto Rodriguez (OTR_Community).
Read more about Valentina Costa-Gazcón

Right arrow

Creating an adversary emulation plan

Before creating our emulation plan, we need to make sure that we understand what we mean when we talk about "adversary emulation."

What is adversary emulation?

There is not a clear definition of the concept of adversary emulation and there have even been discussions about the words used to describe the activity (see, for example, Tim MalcomVetter's article on the subject: Emulation, Simulation & False Flags (https://medium.com/@malcomvetter/emulation-simulation-false-flags-b8f660734482).

But I prefer the definition provided by Erik Van Buggenhout in his SANS Pentest Hackfest 2019 presentation: Automated adversary emulation using Caldera (also presented at BruCON: https://www.youtube.com/watch?v=lyWJJRnTbI0), in which he defines the activity as follows:

Adversary emulation is an activity where security experts emulate how an adversary operates. The ultimate goal is to improve how resilient the organization is versus...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Practical Threat Intelligence and Data-Driven Threat Hunting
Published in: Feb 2021Publisher: PacktISBN-13: 9781838556372

Author (1)

author image
Valentina Costa-Gazcón

Valentina Costa-Gazcón is a cyber threat intelligence analyst who specializes in tracking Advanced Persistent Threats (APTs) worldwide, using the MITRE ATT&CK Framework to analyze their tools, tactics, techniques, and procedures (TTPs). She is a self-taught developer and threat hunter with a degree in translation and interpretation from the Universidad de Málaga (UMA) and a cyber security diploma from Argentina's Universidad Tecnológica Nacional (UTN). Valentina also is one of the founders of the BlueSpace community (BlueSpaceSec) and one of the core members of Open Threat Research, founded by Roberto Rodriguez (OTR_Community).
Read more about Valentina Costa-Gazcón