The document discusses adversary emulation and red teaming. It defines red teaming as emulating advanced persistent threat (APT) attacks. It describes APT groups and their goals of espionage and sabotage. Common APT groups and their targeted industries are listed. Methodologies for red teaming like MITRE ATT&CK and the cyber kill chain are explained. The differences between penetration testing and red teaming are outlined. Tools and platforms for adversary emulation like Cobalt Strike and Atomic Red Team are provided. The average costs of data breaches are cited from an IBM report. Defeating APT attacks is discussed as understanding enemies, continuous practice, and implementing security in depth.