Video On Demand
Cracking Perimeters in an Evolving Landscape: A Red Team’s Perspective
Mike Felch
Mike Felch
Runtime: 32:36
For the past twenty years, attackers have been compromising corporate networks using techniques that have forced an evolution in the threat landscape. As more corporations adopt cloud services for computing, email, and storage outside the perimeter, they also inherit new security risks. Validating security controls through a red team engagement means the analysts need to construct tailored attack paths specific to the unique environment, uncovering exploitable gaps before the attacker. This presentation begins by discussing adaptive techniques being used in the wild for cracking perimeters. Next, you will learn how attackers are blending into the cloud and on-premises environments. Finally, this session will show you how a simple compromise could mean collateral damage when attacks go unmonitored.

Related Videos

Cloud, Container & Data Center Security Ransom in Amazon Web Services (AWS)
Spencer Gietzen CrowdStrike 26:23
Cloud, Container & Data Center Security See More, Know More, Do More with Cloud Security Posture Management
Multiple Speakers CrowdStrike 20:55
Cloud, Container & Data Center Security Securing Cloud Workloads
Vineet Kumar CrowdStrike 27:37