Click the link!

https://redsiege.com/ab2

Welcome back to our next SiegeCast!

On August 18th at 3pm EDT we will be presenting “ASSUMED BREACH PART II”

As a continuation of “ASSUMED BREACH PART I” with Tim Medin – We will be taking an even deeper and more critical look at today’s current penetration test standard. The current model for penetration testing is broken. The typical scan and exploit model doesn’t reflect how real attackers operate after establishing a foothold. At the same time, most organizations aren’t mature enough to need a proper red team assessment. It’s time to start adopting the assumed breach model. In this talk, Mike will discuss techniques for assumed breach assessments that provide a better model for emulating the techniques attackers use once they’re they’ve established a foothold inside a typical network..

We encourage you to sign up for this webcast, as well as become part of the Red Siege community discord – https://redsiege.com/discord

Corey Overstreet and Tim Medin will be in the discord as well answering any questions along side the discussion.

There, we will be taking our questions and interacting with the community, as well as posting links the coincide with the conversation.

We look forward to seeing you there!

Tim Medin

Tim is the Founder and Principal Consultant at Red Siege. Tim is also a Principal SANS Instructor, the SANS MSISE Program Director and a SANS course author. Tim is the creator of the Kerberoasting, a technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts. Tim hoLds GWAPT, GPEN, GMOB, GCED, and GCIH certifications and he previously held the CCNA certification

Mike Saunders

Mike is a Principal Consultant at Red Siege. Mike has over 25 years of experience in IT and security and has worked in the ISP, financial, insurance, and agribusiness industries. He currently holds the GCIH, GPEN, GWAPT, GMOB, CISSP, and OSCP certifications

Corey Overstreet

Corey is the Senior Penetration Tester at Red Siege. Corey is a credentialed OSCE ,OSCP and OSEE and has participated as a member of the SECCDC. He has a enxtensive career as an experienced pentetration tester, red team operatior and has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare.