Threat Perspective from a Reformed Red Teamer

  • Date 21 Nov 2019 - Thursday

Threat Perspective from a Reformed Red Teamer

21 Nov 2019, 10:25 - 11:10

Geek Street

Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and conduct vulnerability assessments. How do you know if they protect against real threats?

After this session you will be able to

  • Understand differences between vulnerabilities and cyber threat tactics, techniques and procedures (TTPs) and how approaching security from a threat perspective can dramatically reduce operational risk due to cyber activities
  • Understand how the inclusion of cyber threat TTPs in security operations planning, design, implementation, and testing can greatly improve organizational security posture by applying a threat-based approach to security testing 

  • Distinguish between common security testing types used to measure an organization's security posture and identify the gaps threat-based security testing can address
  • Understand the concepts of Red Teaming, Adversarial Emulation, and Threat Emulation as they are defined and explored as a means to perform threat-based security testing



  • Joe Vest


    Director of Training and Internal Services


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.