Главная
Study mode:
on
1
Intro
2
Agenda
3
What Is Red Teaming?
4
Basic Elements Of A Red Team
5
Electronic
6
Social
7
Physical
8
Other Activities
9
Traditional Assessment Process
10
Why Is This Flawed?
11
Point In Time Risk Reliance Scenario
12
Setting Up A Successful Red Team
13
Threat Modeling And Threat Analysis
14
Business Goals And Risks
15
The Software Attack Surface
16
High Risk Of Low Risk Applications
17
Composite Attack Scenario
18
Why Bother?
19
Scalability
Description:
Explore the evolution of red teaming in cybersecurity through this 46-minute OWASP Foundation conference talk. Delve into the limitations of traditional assessment methods and discover how to integrate application-specific attack surfaces into more effective red team efforts. Learn about composite, cross-domain attack vectors and their potential to identify organizational risks more comprehensively. Gain insights from real-world examples demonstrating the power of application-centric composite attacks in modern red teaming approaches. Understand key elements of successful red team setups, including threat modeling, business risk analysis, and the importance of considering the software attack surface. Examine the scalability of these advanced techniques and their significance in today's cybersecurity landscape.

Next Generation Red Teaming - Integrating Application-Centric Attacks

OWASP Foundation
Add to list
0:00 / 0:00