Practical validation framework for security controls and detection efficacy webinar announced
Summary
Hide ▲
Show ▼
A forthcoming webinar introduces Exposure-Driven Resilience, a methodology to automate and continuously validate security posture against real attacker behavior. The session emphasizes moving beyond mere existence of controls or active alerts to actively testing whether defenses would withstand a live intrusion attempt. It highlights systematic pressure-testing of both technical controls and operational processes, guided by threat intelligence, and integrating validation into SOC and incident response workflows. Jermain Njemanze and Sébastien Miguel will present practical implementation guidance and conduct a live demonstration of the approach.
Timeline
-
26.03.2026 13:07 1 articles · 3h ago
Exposure-Driven Resilience webinar announced: validating defenses against real attacker behavior
A public announcement introduces Exposure-Driven Resilience, a methodology to automate and continuously validate security posture by testing defenses against real attacker TTPs. The session outlines how to pressure-test controls and processes, use threat intelligence to guide testing scope, and integrate validation into SOC and IR workflows without added complexity. Presenters Jermain Njemanze and Sébastien Miguel will provide implementation guidance and conduct a live demonstration.
Show sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07
Information Snippets
-
Exposure-Driven Resilience is a proposed methodology to validate security posture by continuously testing defenses against real attacker tactics, techniques, and procedures (TTPs).
First reported: 26.03.2026 13:071 source, 1 articleShow sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07
-
The webinar will focus on automating validation of both security controls and operational processes to ensure they perform as expected during a live attack scenario.
First reported: 26.03.2026 13:071 source, 1 articleShow sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07
-
Threat intelligence will be used to guide which attack behaviors are tested, ensuring relevance to current and active threats.
First reported: 26.03.2026 13:071 source, 1 articleShow sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07
-
The session aims to integrate validation into existing SOC and incident response workflows without adding unnecessary operational complexity.
First reported: 26.03.2026 13:071 source, 1 articleShow sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07
-
Jermain Njemanze and Sébastien Miguel are scheduled to present the methodology and conduct a live demonstration during the session.
First reported: 26.03.2026 13:071 source, 1 articleShow sources
- [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks — thehackernews.com — 26.03.2026 13:07