Security BSides Las Vegas 2025

Threat and adversary emulation operational exercises
2025-08-05 , Boardroom

This hands-on workshop provides participants with foundation in practical threat and adversary emulation. Designed for security professionals looking to enhance their offensive and defensive capabilities, the training takes place in a controlled, enterprise-grade lab environment equipped with real-world defensive technologies, including Anti-Virus, Web Proxies, EDR, SIEM integration, and other detection mechanisms.
Participants will engage in guided step-by-step exercises to safely emulate real-world threat actors and assess the effectiveness of common security controls. The workshop covers key areas such as gathering actionable cyber threat intelligence, planning and executing adversary emulation engagements, and using a variety of emulation tools and frameworks. Attendees will also learn how to map techniques to the MITRE ATT&CK framework, conduct threat hunting activities, and design custom adversary emulation plans tailored to organizational needs.
By the end of the workshop, attendees will be equipped with the practical skills needed to operationalize threat emulation efforts and strengthen their organization’s cyber defense posture.
\


This hands-on workshop is designed to equip participants with a solid foundation in practical threat and adversary emulation. Through guided exercises in a controlled, enterprise-grade lab environment, attendees will learn how to safely emulate real-world threat actors. All lab systems will include active defenses such as Anti-Virus, Web Proxies, EDR, SIEM integration and other detection mechanisms.
Key topics covered include:
• Gathering actionable cyber threat intelligence
• Planning and executing adversary emulation engagements
• Utilizing attack emulation tools and frameworks
• Leveraging MITRE ATT&CK for mapping and execution
• Threat hunting techniques
• Building custom adversary emulation plans
• An introduction to dynamic adversary simulation
Each module includes step-by-step walkthroughs of attack vectors, guiding participants through realistic attack paths across enterprise environments. The goal is to help attendees evaluate the effectiveness of security controls and better understand how to test and improve cyber defenses through adversary emulation.

Abhijith B R, also known by the pseudonym Abx, has over a decade of experience in the offensive cyber security industry. He is a professional hacker, offensive security specialist, red team consultant, researcher, trainer, and public speaker.
He is currently building Breachsimrange.io and working with multiple organizations as a consulting specialist, helping them build offensive security operations, improve their security posture, assess cyber defense systems, and bridge the gap between business leadership and security professionals.

Abhijith previously worked with Envestnet, Nissan Motor Corporation and EY.
As the founder of Adversary Village, Abhijith leads a community initiative focused on adversary simulation, tactics, purple teaming, threat actor and ransomware research-emulation, and offensive cyber security. Adversary Village is part of the DEF CON Villages and hosts hacking villages at major events like DEF CON and RSA Conference.
He also leads the Tactical Adversary project (https://tacticaladversary.io/), a personal initiative focused on offensive cybersecurity, adversary simulation, and red teaming tradecraft.
Abhijith has spoken at conferences including DEF CON, RSA Conference, The Diana Initiative, Opensource India, Security BSides (Las Vegas, SF, Delhi), Hack Space Con, Nullcon, and c0c0n.