Tuesday, June 4, 2019 49 days ago 12:30 - 17:00
Spaces limited - register early to avoid disappointment.
This MWR Briefing has passed, but you can sign up to be notified of future events, or register for another of our upcoming events by visiting our MWR Briefings page.
Our first annual briefing will feature a selection of our leading consultants and directors. Here is a brief overview of what we will discuss on the day:
Through the use of tools such as Bloodhound, attackers have made significant advancements in identifying and navigating attack paths through large complex IT environments. These advancements greatly decrease the time to compromise highly privileged systems. Consequently, many organisations have been put on the back-foot, having to rely on time-consuming traditional techniques such as threat modelling – a poor fix for countering ever-progressing threats.
Join us as we explore how offensive security techniques can be adapted to support the identification of attack paths in an efficient, automated way, at scale, and in real time.
With over 4000 distinct permissions – and counting – understanding how access is managed within an AWS environment is an often daunting and time consuming task that requires an expert capability. Developing a comprehensive understanding of its intricacies can be a costly endeavour, while not doing so could be more costly still.
This talk explores some of the new challenges cloud-based technologies present, and how they can be approached by applying concepts traditionally used in offensive security testing. In addition, we will delve deeper into the latest research we are conducting and tooling being developed to equip organisations with situational context.
Due to the limited number of places available, please note that your registration is subject to approval and will be confirmed via email by a member of our team.
We hope to see you there!