Infosecurity Europe 2019: XM Cyber to Debut at Europe’s Leading Cybersecurity Event

 In Blog

With over 15,000 attendees anticipated to come this year, Infosecurity Europe promises to be sourcing and knowledge hub for Europe’s information and cybersecurity community.

XM Cyber is very excited to make its debut at Infosecurity Europe, where our global team of experts – including our new UK-based staff – will showcase XM Cyber’s newly enhanced platform to our peers, security professionals, journalists, and industry analysts. The conference will be held on June 4-6 in London.

Stop by our booth #H90 to see the automated purple team in action! Experience a live demo of our award-winning breach and attack simulation (BAS) platform, combining continuously and automatically red and blue teams’ activities. We will show:

  • APT simulations from breach point to critical assets
  • Full attack paths
  • Prioritized actionable remediation plan

Want to schedule a specific time to meet? Click here and one of our colleagues will reach out to schedule.

Also, don’t miss our presentation on “Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It”

Date: June 5, 10:00-10:25, Strategy Talks

Speaker: Menachem Shafran, XM Cyber’s Head of Product

In light of the TIBER-EU, a framework for testing financial sector resilience to cyber attacks published in May 2018 by the European Central Bank, Menachem Shafran will discuss the relations between red teaming and threat intelligence, why there is a need to automate these processes and how purple teams can elevate an organization’s security posture. Click here for the learning objectives.

About XM Cyber’s HaXM platform

HaXM is the first automated APT Simulation platform to expose, assess and amend every attack path to an organization’s critical assets in real time, 24×7. It uses automated purple teaming processes that combine red and blue team activities and leverages real user behavior to provide the full APT experience on one hand, while delivering prioritized remediation on the other.

The field-proven platform is simply and rapidly deployed in three simple steps, beginning with the selection of targeted assets, activation of ongoing attack scenarios and generation of prioritized actionable remediation, all in a continuous loop.

New call-to-action

Recommended Posts