Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Hacking Identity: A Pen Tester's Guide to IAM

Hacking Identity: A Pen Tester's Guide to IAM
Sob demanda
  • Data gravada:Aug. 1, 2018
  • Evento:Sob demanda
Hacking Identity: A Pen Tester's Guide to IAM
Know your opponent and know yourself. It held true for Sun Tzu 2500 years ago. And it holds true for pen testers today. 

Listen this informative on-demand webcast by Jerod Brennen, One Identity Security Solutions Architect. He is sharing insights learned over the years fulfilling InfoSec roles in consulting, higher education, retail and public utilities. 

O que você vai aprender

The webcast covers a variety of timely topics, such as:

  • How understanding the strengths and weaknesses of identity and access management (IAM) in an enterprise setting is critical to a pen tester’s success
  • Pen testing tips and tricks for red teams to circumvent weak or missing IAM controls
  • Strategies blue teams can employ to bolster their IAM controls 

Palestrantes

I'm Jerod (@slandail), a Security Solutions Architect with One Identity.

By night, I'm a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it's fair to say that I've earned every gray hair in my beard, having spent my career fulfilling infosec roles in consulting, higher education, retail, and public utilities.

I like to share what I've learned over the years with local and regional information security professional organizations, as well as attendees at larger information security conferences. I also teach information security courses, both domestically and internationally.

At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.

Assistir a seu webcast gratuito

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.