Best Offers of the Year Ends Tomorrow - Don't Miss Out! Get an iPad Air with Smart Keyboard or Pixel 4a Smartphone!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Adversary emulation using CALDERA Building custom plugins Part #3

  • Monday, May 04, 2020 at 1:00 PM EDT (2020-05-04 17:00:00 UTC)
  • Erik Van Buggenhout

You can now attend the webcast using your mobile device!



In our final webcast in the series, we will take it a step further. While we covered development of CALDERA abilities during the previous webcast, we will develop custom plugins now. Plugins are at the core of CALDERA and can be used to further extend the engine and CALDERAs overall capabilities. We will show an example of a custom plugin that can be developed to create a custom JSON export of MITRE ATT&CK coverage. This in turn can be used to build a fully automated adversary emulation pipeline that reports on both prevention & detection coverage of MITRE ATT&CK techniques!

Speaker Bio

Erik Van Buggenhout

Erik Van Buggenhout is the lead author of SEC599 - Defeating Advanced Adversaries and SEC699 - Purple Team Tactics. In addition to SEC599 and SEC699, Erik teaches SEC560 - Network Penetration Testing & Ethical Hacking and SEC542 - Web Application Penetration Testing & Ethical Hacking. In addition to his work with SANS, Erik is the co-founder of Belgian cyber security firm NVISO. Together with his team of 70+ technical experts, Erik delivers a wide array of technical security services, including penetration testing, security monitoring & incident response.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.