Next Generation Red Teaming - Integrating Application-Centric Attacks
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the evolution of red teaming in cybersecurity through this 46-minute OWASP Foundation conference talk. Delve into the limitations of traditional assessment methods and discover how to integrate application-specific attack surfaces into more effective red team efforts. Learn about composite, cross-domain attack vectors and their potential to identify organizational risks more comprehensively. Gain insights from real-world examples demonstrating the power of application-centric composite attacks in modern red teaming approaches. Understand key elements of successful red team setups, including threat modeling, business risk analysis, and the importance of considering the software attack surface. Examine the scalability of these advanced techniques and their significance in today's cybersecurity landscape.
Syllabus
Intro
Agenda
What Is Red Teaming?
Basic Elements Of A Red Team
Electronic
Social
Physical
Other Activities
Traditional Assessment Process
Why Is This Flawed?
Point In Time Risk Reliance Scenario
Setting Up A Successful Red Team
Threat Modeling And Threat Analysis
Business Goals And Risks
The Software Attack Surface
High Risk Of Low Risk Applications
Composite Attack Scenario
Why Bother?
Scalability
Taught by
OWASP Foundation
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera