SIEGECAST: ASSUMED BREACH PART I

Traditional penetration testing often concede internal access to the tester, but then the tester does a lot of scanning and poking around. This is not representative of most breaches. Most breaches start with a phish and adversary effectively starts with access as one of your users on one of your systems. Are you prepared to defend? In this talk, Tim Medin will discuss the shortcomings of the traditional penetration test, and talk you through ways to deliver (and receive) a higher value penetration test.

> WATCH SIEGECAST HERE<

> DOWNLOAD SLIDES HERE<

 

Join the Red Siege community Discord server: redsiege.com/discord

You can always reach out to our team at redsiege.com/#contact