Thursday, June 6, 2019 12:30 - 17:00
Get the latest insights from a selection of our leading consultants and directors
Spaces for our briefing are currently limited. Register early to book your seat!
Below is a short overview of some of the topics we will discuss:
Through the use of tools such as Bloodhound, attackers have made significant advancements in identifying and navigating attack paths through large complex IT environments. These advancements greatly decrease the time to compromise highly privileged systems. Consequently, many organisations have been put on the back-foot, having to rely on time-consuming traditional techniques such as threat modelling – a poor fix for countering ever-progressing threats.
Join us as we explore how offensive security techniques can be adapted to support the identification of attack paths in an efficient, automated way, at scale, and in real time.
With over 4000 distinct permissions – and counting – understanding how access is managed within an AWS environment is an often daunting and time consuming task that requires an expert capability. Developing a comprehensive understanding of its intricacies can be a costly endeavour, while not doing so could be more costly still.
This talk explores some of the new challenges cloud-based technologies present, and how they can be approached by applying concepts traditionally used in offensive security testing. In addition, we will delve deeper into the latest research we are conducting and tooling being developed to equip organisations with situational context.
Due to the limited number of places available, please note that your registration is subject to approval and will be confirmed via email by a member of our team.
We hope to see you there