A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Adversarial Emulation - Bryson Bort Derbycon 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

Adversarial Emulation
Bryson Bort
Derbycon 2019

Today's red team isn't enough. Because we want to move our defenses and understanding beyond a detection-based approach which has repeatedly been demonstrated to fail. How do we emulate an adversary? We will go through multiple considerations of the entire red team lifecycle including walking through open source toolsets. We will talk through in detail specific host and network activities for emulation. And, we will conclude with how we can work on these activities toward a purple team approach.

Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a boutique cybersecurity consultancy, and Co-Founder of the ICS Village, a non-profit advancing awareness of industrial control system security. He is a National Security Institute Fellow and an Advisor to the Army Cyber Institute. Prior, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

@brysonbort

Back to Derbycon 2019 video list

Printable version of this article

15 most recent posts on Irongeek.com:


    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast