https://redsiege.com/haystack

REGISTRATION IS OPEN!

Red Siege is proud to present its very first SiegeCast!  We have been taking part in so many fantastic webcasts and have been looking forward to providing one of our own! The team decided to make our topic something beneficial for both the offense and defense to start.

On May 14th at 3pm EDT we will be presenting ” HUGE NEEDLES, SMALL HAYSTACK “

Founder Tim Medin, along side Principal Consultant Mike Saunders, and Senior Penetration Tester Corey Overstreet are going to tackle the question : Ever wonder how attackers gather information on a target organization?

Knowing where to look can uncover a wealth of information leading to a successful phish or first foothold. In this talk, the team will cover different intelligence gathering techniques targeting an organization’s external services and staff all while leaving little to no trace of our actions.

We encourage you to sign up for this webcast, as well as become part of the Red Siege community discord – https://redsiege.com/discord

There, we will be taking our questions and interacting with the community, as well as posting links the coincide with the conversation.

We look forward to seeing you there!

Tim Medin

Tim is the Founder and Principal Consultant at Red Siege. Tim is also a Principal SANS Instructor, the SANS MSISE Program Director and a SANS course author. Tim is the creator of the Kerberoasting, a technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts. Tim hoLds GWAPT, GPEN, GMOB, GCED, and GCIH certifications and he previously held the CCNA certification

Mike Saunders

Mike is a Principal Consultant at Red Siege. Mike has over 25 years of experience in IT and security and has worked in the ISP, financial, insurance, and agribusiness industries. He currently holds the GCIH, GPEN, GWAPT, GMOB, CISSP, and OSCP certifications

Corey Overstreet

Corey is the Senior Penetration Tester at Red Siege. Corey is a credentialed OSCE ,OSCP and OSEE and has participated as a member of the SECCDC. He has a enxtensive career as an experienced pentetration tester, red team operatior and has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare.