Blue Teaming

4 min read

How to turn exposure data into real-world cyber readiness: 7 key takeaways from our webinar

Discover 7 key takeaways from our webinar on turning exposure data into real-world cyber readiness with Threat Range, our team-based simulation platform.

diskordia avatar

diskordia,
Dec 17
2025

In the latest in a lineup of CTEM-focused webinars, HTB’s Giacomo Bertollo (Product Marketing Lead) and Pavlos Kolios (the brain behind Threat Range) walked us through why CTEM exposure data alone isn’t enough and how Threat Range bridges the crucial gap between knowing your risks and proving your team can handle them. 

From Threat Range’s raison d’etre to the ugliest challenges of simulating team-based incident response, this webinar covered it all, including a live demo showing the platform’s unique real-time, collaborative experience.

ACCESS THE RECORDING

Short on time? We’ve wrapped up seven of our favorite takeaways that every SOC leader and blue team member should know right now. You can thank us later. 

1. Threat Range was made to solve real team collaboration problems

HTB was already packing heat in the form of individual defensive challenges, but Threat Range is the first product focused on team-based simulations. 

Real SOCs and DFIR teams don’t work in silos—they collaborate continuously. So Threat Range forces multiple roles to operate together on the same network, under the same scenario, sharing notes, alerts, and investigation findings in real time.

This design addresses a major gap: how to replicate the behavioral and communication dynamics of real incident response teams.

2. It’s a full defensive simulation, not disconnected drills

Unlike traditional ranges that focus on single roles or tasks, Threat Range runs an end-to-end incident lifecycle: from alert triage by L1/L2 SOC analysts, through escalation to digital forensics teams, forensic investigation, kill-chain reconstruction, and final incident reporting.

The aim? To mimic real-world workflows and test the entire team’s speed, accuracy, and collaboration under pressure.

3. Real-time synchronization is the way to achieve immersion and effectiveness

One of the standout features demoed was the seamless real-time updates across all players. Everything that happens on one team’s dashboard instantly appears on the other’s. That’s right, no manual refresh or lag included.

This creates a true shared situational awareness, so players experience exactly how coordination and information-sharing work in live incidents. It’s a breakthrough in simulation fidelity and team training.

4. KPIs and metrics turn readiness vibes into actionable data

Our favorite part? The powerful, data-driven metrics that Threat Range collects automatically. These include:

  • Mean Time To Detect (MTTD)

  • Mean Time To Investigate (MTTI)

  • Mean Time To Respond (MTTR)

  • False positive and false negative rates

  • Escalation quality and SLA adherence

Having these KPIs transforms training from vague “I think I feel ready” to precise, actionable insights that highlight strengths and expose gaps.

5. Threat Range’s design puts realism at its center

While creating realistic content like malware, alerts, and logs is straightforward, replicating team behavior remains a real challenge. 

Capturing collaboration, parallel investigations, and communication under time pressure required thoughtful design and a platform that supports shared notes and knowledge exchange.

This focus on behavioral realism is what sets Threat Range apart and prepares teams for the messy, unpredictable reality of cyber defense.

6. Getting up and running in Threat Range is quick and accessible

Threat Range is fully integrated into the Hack The Box CTF platform, making it easy for teams to book and deploy scenarios with minimal setup time. 

The platform is plug-and-play, letting defenders get hands-on fast, whether it’s their first simulation or a recurring readiness exercise.

7. Threat Range ties in with existing HTB content to close skills gaps

Threat Range isn’t a standalone tool; it’s designed to align and slot in with HTB’s broader learning ecosystem. The scenarios are built using the same MITRE ATT&CK framework as HTB’s Academy Modules and Sherlocks, creating a continuous learning journey:

  • Learn theory and tactics in HTB Academy

  • Practice focused skills in Sherlocks and forensic CTFs

  • Test integrated team readiness in Threat Range scenarios

This alignment helps teams identify weak points during simulations and then target specific training content to close those gaps.

WATCH THE FULL RECORDING

What’s next?

If you’ve got questions about how to move beyond dashboards full of exposure data and actually prove your team’s readiness under real-world conditions, Threat Range is the answer. 

It’s a game-changer that combines realistic content, live collaboration, and actionable performance metrics to close the readiness gap and build cyber resilience across your team.

For mature blue teams and SOC leaders serious about continuous improvement, this is the next step in building cyber resilience.


Want to see Threat Range in action or book a scenario for your team? Reach out to your Hack The Box Customer Success representative for a demo or visit the HTB platform to get started.

BOOK A DEMO

Hack The Blog

The latest news and updates, direct from Hack The Box