Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Immersive Labs

Immersive Labs is the world's first human cyber readiness platform. Our technology delivers challenge-based cybersecurity content developed by experts and powered by the latest threat intelligence. Our unique approach enables businesses to battle-test and evidence preparedness to face emerging cyber threats. Immersive Labs stimulates cyber scenarios covering everything from the basics to threat hunting and reverse engineering malware. At the heart of our platform are labs: cloud-based and story-driven exercises accessible on demand. We're developing new labs every day to add to our massive range of practical, gamified content that's also mapped against industry frameworks.

Our Website:

Latest Content From Immersive Labs

Webcast: Weaknesses in Software Supply Chains: Cyber’s Unspoken Reality

by Immersive LabsJul 13, 2021

Until the recent SolarWinds compromise, the conversation around supply chains – and more importantly, their vulnerabilities – was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. And when the core software supply chain itself is compromised, the results are often catastrophic.

In this webinar, we’ll examine the weaknesses in software supply chains and what organizations should consider to protect themselves from malicious attacks.

E-Book: The Ultimate Cyber Skills Strategy Cheat Sheet

by Immersive LabsMar 01, 2021

No one needs more stats about the skills gap in cybersecurity; many organizations are obviously facing challenges in recruiting, skilling, and retaining security professionals. We haven't written this cheat sheet to tell you what you already know. Instead, we will outline realistic strategy for workforce-wide cyber skills development, focusing on the solution, not just the problem.

Explore this cheat sheet and gain insights into topics, such as:

• The state of cybersecurity skills
• Debunking the cybersecurity myths
• The power in continuous cyber skills development
• Elements of a successful cyber skills programs
• And more

E-Book: Aligning Cyber Skills to the MITRE ATT&CK Framework

by Immersive LabsFeb 26, 2021

In order to keep pace with hackers, you need to learn like hackers. That's why when it comes to guidance on building detection and response programs, MITRE ATT&CK® — which has a strong adversarial focus — trumps traditional frameworks such as the Diamond Model (which lacks technical depth), and Lockheed Martin's Cyber Kill Chain (which offers little from the attacker's perspective).

So, how can you maximize MITRE ATT&CK framework to bolster your cyber skills strategy? Gain insights in this eBook, which covers a number of different topics, including:

• What is MITRE ATT&CK and how does it work?
• Tips for identifying your skills weaknesses and security posture
• The beauty of an effective framework
• And more

Research Report: Osterman Research: Cyber Crisis Response - Fit For Today's Threat Landscape?

by Immersive LabsFeb 26, 2021

Cyber crisis response and preparedness is on everyone's lips, yet organizations' efforts are failing to adapt to modern threats. While table top exercises have long been considered an essential tool in preparing organizations to face cyber crises, they're now rapidly falling into obsolescence.

So what's the alternative? How many organizations still rely on PowerPoint-driven table top exercises to bolster their incident response plans? Is this legacy method of defining cyber crisis response widening the gap between attackers and defenders?

In collaboration with Osterman Research, Immersive Labs tapped into the collective consciousness of over 400 CISOs and senior security leaders. We sought to discover how influential security professionals prepare for the worst — and just how far behind legacy training techniques have fallen.

Explore the definitive report into cyber crisis preparedness to discover:

• The pros and cons of tabletop exercises
• Most common cyber crisis preparedness exercise scenarios
• Team gaps in tabletop exercises
• And more

Whitepaper: SUNBURST: Underlining the Importance of 'Right of Boom' Risk Mitigation

by Immersive LabsFeb 26, 2021

When SUNBURST hit the headlines, the infosec world stopped to stare. With a previously unheard-of depth of penetration in the technology supply chain and a pool of victims that includes some of the world's most prominent organizations, it has since been recognized as one of the most impactful attacks to date. And the most worrying part? There was little to nothing that could have been done to prevent it.

So what can be done to prepare incident response teams for such an attack? How can organizations be sure that their 'right of boom' response is as strong as possible?

In this paper, we take a deep dive into how organizations can put the psychological theory behind improving human response into practice to build an effective, agile team that knows what to do when the sun bursts. Topics covered include:

• Why SUNBURST makes 'right of boom' mitigation important
• Understanding the psychological theory behind improving human response
• 3 tips for building more cognitively agile cybersecurity teams
• And more

E-Book: The Psychology of Cyber: How Micro-Drilling Enhances Crisis Response

by Immersive LabsFeb 26, 2021

'Mega breaches' might sounds dystopian, but they're becoming an all too familiar feature of the modern cyber crisis. Yet organizations are still relying on traditional techniques to prepare and exercise their workforces' cyber crisis response. Enter micro-drilling: the modern alternative to tabletop exercising.

In this eBook, we explore the psychology of effective crisis response and take a deep dive into micro-drilling. Most importantly, you'll learn how to use it to power up your incident response teams.

Explore this eBook to discover:

• What is micro-drilling and why is it better than table-top exercising?
• How has the threat landscape collided with the changing role of the CISO to create a need for it?
• What is the psychology behind micro-drilling, and how does it play into modern cybersecurity incidents?