Red-Team-Security

October 29, 2018

1 PM EDT

 

As the number and scope of cyberattacks on corporate networks increase, organizations must remain vigilant as they try to stay one step ahead of the threats. Red teams can help organizations understand how well their networks, applications and security controls can withstand an attack. But with cyberthreats moving and changing at such a high rate of speed, is red teaming worth the effort?  We’ll take a look at the concept of red teams and how they can help organizations improve their security posture and examine whether they can make a difference in corporate cybersecurity. 

Guest Speakers

Tom Eston - Speaker Headshota

Tom Eston, Manager of Penetration Testing, CA Veracode

Tom Eston is the Manager of Penetration Testing at CA Veracode. Tom's work over his 14 years in cybersecurity has focused on network, red team, application penetration testing, as well as security and privacy research. He has led multiple projects in the cybersecurity community, improved industry standard testing methodologies, and is an experienced team manager and leader. He is also the founder and co-host of the weekly Shared Security Podcast; and a frequent speaker at security user groups and international cybersecurity conferences including Black Hat, DEF CON, DerbyCon, SANS, InfoSec World, OWASP AppSec, and ShmooCon.