Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Next Generation Red Teaming - Integrating Application-Centric Attacks

OWASP Foundation via YouTube

Overview

Explore the evolution of red teaming in cybersecurity through this 46-minute OWASP Foundation conference talk. Delve into the limitations of traditional assessment methods and discover how to integrate application-specific attack surfaces into more effective red team efforts. Learn about composite, cross-domain attack vectors and their potential to identify organizational risks more comprehensively. Gain insights from real-world examples demonstrating the power of application-centric composite attacks in modern red teaming approaches. Understand key elements of successful red team setups, including threat modeling, business risk analysis, and the importance of considering the software attack surface. Examine the scalability of these advanced techniques and their significance in today's cybersecurity landscape.

Syllabus

Intro
Agenda
What Is Red Teaming?
Basic Elements Of A Red Team
Electronic
Social
Physical
Other Activities
Traditional Assessment Process
Why Is This Flawed?
Point In Time Risk Reliance Scenario
Setting Up A Successful Red Team
Threat Modeling And Threat Analysis
Business Goals And Risks
The Software Attack Surface
High Risk Of Low Risk Applications
Composite Attack Scenario
Why Bother?
Scalability

Taught by

OWASP Foundation

Reviews

Start your review of Next Generation Red Teaming - Integrating Application-Centric Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.