Adversary simulation, emulation or purple teaming - How would you define it?

Adversary Village DefCon USA 2021

2021/08/06

AI Generated Summary

This panel discussion from Adversary Village at DefCon USA 2021 explores the definitions, maturity requirements, business justification, and career paths for adversary simulation, emulation, and purple teaming.

Panelists

Key Topics Discussed

Defining Adversary Simulation, Emulation, and Purple Teaming:

Jean-Marie’s Perspective:

Joe’s Perspective:

Vincent’s Perspective:

Martin’s Perspective:

Samuel’s Perspective:

Common Threads:

Maturity Requirements:

Samuel’s View:

Joe’s View:

Jean-Marie’s View:

Martin’s View:

Vincent’s View:

Getting Budget/Investment:

Jean-Marie’s Approach:

Joe’s Approach:

Vincent’s Approach:

Martin’s Approach:

Samuel’s Approach:

Career Guidance - Getting Into Adversary Simulation/Emulation:

Samuel’s Recommendations:

Martin’s Recommendations:

Vincent’s Recommendations:

Joe’s Recommendations:

Jean-Marie’s Recommendations:

Key Insights:

Important Concepts:

Actionable Takeaways:

  1. Start with goals, not definitions - what are you trying to measure?
  2. Educate clients/leadership on threat perspective, not just technical terms
  3. Include response phase in engagements - detection useless without response
  4. Don’t wait for perfect maturity - start early to identify gaps
  5. Use cost comparison (exercises vs. ransomware) for budget justification
  6. For career: IT background + threat intel + understand both red and blue
  7. Understand infrastructure before trying to attack it
  8. Map attacks back to detection and response opportunities
  9. Purple teaming can incorporate both simulation and emulation
  10. Focus on impact threat’s ability to be successful, not preventing all attacks