Главная
Study mode:
on
1
Intro
2
Question for the audience
3
Purpose of this Talk
4
What is Red Teaming?
5
History of Red Teaming
6
Red Teaming in the InfoSec Context
7
Why Red Team
8
Not a Bug Hunt
9
Adversary Emulation
10
Know Yourself
11
Basic Elements of a Red Team Assessment
12
Electronic
13
Social
14
Physical
15
Building an In-House Red Team
16
Placing the Red Team
17
Red Team Dynamic - Leader
18
Red Team Dynamic - Assessors
19
Getting Managerial Support
20
Common Push Backs
21
Common Pit Falls
22
Red Team Runbook
23
Reconnaissance
24
Passive Recon Examples
25
Active Recon Examples
26
Attack Planning
27
Post-Exploitation
28
Having a Big Bag of Tricks
29
Putting it all Together
Description:
Explore the fundamentals of red teaming in cybersecurity through this 46-minute conference talk from BSides Philly 2016. Delve into the history and purpose of red teaming, understand its role in information security, and learn how to build an in-house red team. Discover the basic elements of a red team assessment, including electronic, social, and physical aspects. Gain insights on team dynamics, managerial support, common challenges, and pitfalls. Examine the red team runbook, covering reconnaissance techniques, attack planning, post-exploitation, and the importance of a diverse skill set. Learn how to effectively emulate adversaries and conduct comprehensive security assessments to strengthen your organization's defenses.

Red Team Yourself - Thomas Richards

Add to list
0:00 / 0:00