For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Hacking Identity: A Pen Tester's Guide to IAM

Hacking Identity: A Pen Tester's Guide to IAM
On Demand
  • Recorded Date:Aug. 1, 2018
  • Event:On Demand
Hacking Identity: A Pen Tester's Guide to IAM
Know your opponent and know yourself. It held true for Sun Tzu 2500 years ago. And it holds true for pen testers today. 

Listen this informative on-demand webcast by Jerod Brennen, One Identity Security Solutions Architect. He is sharing insights learned over the years fulfilling InfoSec roles in consulting, higher education, retail and public utilities. 

What you will learn

The webcast covers a variety of timely topics, such as:

  • How understanding the strengths and weaknesses of identity and access management (IAM) in an enterprise setting is critical to a pen tester’s success
  • Pen testing tips and tricks for red teams to circumvent weak or missing IAM controls
  • Strategies blue teams can employ to bolster their IAM controls 


I'm Jerod (@slandail), a Security Solutions Architect with One Identity.

By night, I'm a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it's fair to say that I've earned every gray hair in my beard, having spent my career fulfilling infosec roles in consulting, higher education, retail, and public utilities.

I like to share what I've learned over the years with local and regional information security professional organizations, as well as attendees at larger information security conferences. I also teach information security courses, both domestically and internationally.

At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.