Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Read the original article: Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency


Threat intelligence and response teams need to be ready to respond to an increasing barrage of risks and changes. To be exact, this is where breach-and-attack-simulation (BAS) comes in. Most groups use BAS platforms to validate security controls against various types of data breaches. Meanwhile, IBM Security saw that it could also be very useful as […]

The post Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency appeared first on Security Intelligence.


Read the original article: Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency