Главная
Study mode:
on
1
Intro
2
Martin Bos
3
Security Today
4
Enter the Red Team
5
Its not a Magical Black Art
6
Easy Wins
7
Deployment Misconfigurations
8
Patching
9
Buy a Vulnerability Scanner
10
Fix Low Hanging Fruit (HIV)
11
Same Techniques, Same Methods
12
Enter the Blue Team
13
Remediation
14
Disconnect?
15
Cyber Hygiene
16
How do I know if my vulnerability management program is working?
17
The product industry has set us back 10 years
18
Death of Traditional Penetration Testing
19
Red + Blue = Purple
20
Breach = Panic Mode
21
Sophisticated
22
What Am I Trying To Protect?
23
Know Your Adversaries
24
Cut Down the Noise
25
Detection
26
Compensating Controls
27
Risk Appetite
28
Stop Complaining!
29
Password Policies
30
Easy Mitigations
31
Deny access to this computer from the network
32
Hire an Internal Pentester
33
Research Your Vendor
34
What SHOULD I get out of this?
Description:
Explore a comprehensive conference talk from Louisville InfoSec 2016 featuring Martin Bos on the topic of pen testing and the collaboration between red and blue teams. Delve into the current state of security, the role of red teams, and common vulnerabilities. Learn about blue team responsibilities, remediation strategies, and the importance of cyber hygiene. Discover the evolution of penetration testing, the concept of purple teaming, and how to effectively protect against adversaries. Gain insights on improving vulnerability management, implementing compensating controls, and developing appropriate risk appetites. Acquire practical tips on password policies, easy mitigations, and the benefits of hiring internal pentesters. Understand the value of researching vendors and maximizing the benefits of security assessments in this informative one-hour presentation.

Technical Pen Testing - Red and Blue Working Together

Add to list
0:00 / 0:00