Posted on
in Presentations
Offensive security practitioners have a wide array of tools and tactics to breach perimeters and bypass controls. Yet our efforts to enact change are often abated by organizational positioning, cognitive biases and misunderstanding. This talk will explore where the boundaries for red teams can expand and strategies to enact security behavior change at scale both internally and technology communities at large.
Pre-Requisites: A fundamental understanding of Security Engagement (culture, human behaviors, social engineering basics), offensive security / red team fundamentals (i.e. operations, assume breach, protect-defend-respond).
Pre-Requisites: A fundamental understanding of Security Engagement (culture, human behaviors, social engineering basics), offensive security / red team fundamentals (i.e. operations, assume breach, protect-defend-respond).
Business Perspectives Hackers & Threats Human Element
social engineering security awareness practitioner perspectives deception-based security
Topic
Business Perspectives
Hackers & Threats
Human Element
Subtopic
social engineering
security awareness
practitioner perspectives
deception-based security
Share With Your Community