Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Hacking Identity: A Pen Tester's Guide to IAM

Hacking Identity: A Pen Tester's Guide to IAM
a la demande
  • Date enregistrée:Aug. 1, 2018
  • Événement:a la demande
Hacking Identity: A Pen Tester's Guide to IAM
Know your opponent and know yourself. It held true for Sun Tzu 2500 years ago. And it holds true for pen testers today. 

Listen this informative on-demand webcast by Jerod Brennen, One Identity Security Solutions Architect. He is sharing insights learned over the years fulfilling InfoSec roles in consulting, higher education, retail and public utilities. 

Ce que vous apprendrez

The webcast covers a variety of timely topics, such as:

  • How understanding the strengths and weaknesses of identity and access management (IAM) in an enterprise setting is critical to a pen tester’s success
  • Pen testing tips and tricks for red teams to circumvent weak or missing IAM controls
  • Strategies blue teams can employ to bolster their IAM controls 

Intervenants

I'm Jerod (@slandail), a Security Solutions Architect with One Identity.

By night, I'm a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it's fair to say that I've earned every gray hair in my beard, having spent my career fulfilling infosec roles in consulting, higher education, retail, and public utilities.

I like to share what I've learned over the years with local and regional information security professional organizations, as well as attendees at larger information security conferences. I also teach information security courses, both domestically and internationally.

At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.