Threat & Attack Simulation
On-Demand Webinar
Threat & Attack Simulation

The Brick House: Continuous Penetration Testing—Defending Against the Modern Threat Actor

Watch Now

Security Validation Through Attack Simulation

As the threat landscape evolves and attack surfaces continue to expand, does traditional point-in-time penetration testing provide the coverage organizations need? Watch this Brick House roundtable to explore how security leaders are shifting toward continuous penetration testing and validation—using threat intelligence, automation and targeted simulations to stay ahead of adversaries.

This discussion will highlight how leading organizations are applying continuous testing practices—from red team operations to BAS platforms and phishing campaigns—to proactively assess risk across systems, people and supply chains.

In this webinar, you’ll learn about:

  • Third-party risk exposure and the expanding attack surface
  • The limitations of point-in-time validations
  • Building a business case for continuous security validation
  • The strategic use of tools and partners to simulate attacks from multiple perspectives
  • How threat-informed simulations drive more meaningful outcomes

This session brings together experts from GuidePoint’s Threat & Attack Simulation and Penetration Testing teams, sharing how continuous adversary emulation supports real-world resilience.

Hosted by Gary Brickhouse, CISO at GuidePoint Security, featuring:

  • Alberto Rodriguez, Senior Managing Security Consultant
  • Cameron Stish, Senior Security Consultant
  • Dale Madden, Managing Security Consultant
  • Victor Wieczorek, Senior Vice President, Offensive Security

Whether you’re a cybersecurity executive building the strategy or a practitioner implementing the controls, this discussion will show why continuous validation is becoming a cornerstone of effective enterprise security.

About The Brick House:

The Brick House is a monthly panel discussion with Gary Brickhouse, CISO and expert guests examining the hottest topics in cybersecurity. There are no talking heads here, just honest conversations examining the problems we all face in cybersecurity. Gain insights from security practitioners who have current, real-world experience solving the most complex cybersecurity challenges.