Greetings from the Red Team!


Posted on in Presentations

"Attack where your opponent is weakest. Be in the place your opponent cannot see. Do what your opponent does not expect." These principles led to the development of a devastating new social engineering attack that has been used to breach countless, high-security environments over the last year. This session will walk through the development and execution of the attack and how to defend against it.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Michael Allen

Speaker

Red Team Practice Lead, Black Hills Information Security


Share With Your Community