The document discusses emulating adversaries by leveraging threat intelligence. It proposes emulating APT29 as the adversary. The outline discusses gathering intelligence on APT29, recognizing gaps or imperfections in the intelligence, developing tools and techniques to fill in gaps, and organizing the intelligence into an emulation plan. The document provides background on adversary emulation and challenges it introduces due to needing threat intelligence and dealing with imperfect intelligence.
Related topics: