У нас вы можете посмотреть бесплатно Red Teaming: The Essential Tool for Security Leaders или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
https://bishopfox.com - Today’s security leaders are operating in a drastically different landscape. AI is accelerating attacker capabilities, expanding the attack surface into identity, cloud, SaaS, and GenAI systems, and enabling threats that move faster than traditional controls can keep up. At the same time, new regulations and frameworks are shifting from checkbox audits to evidence-based resilience, pushing organizations toward adversarial testing as a requirement—not a luxury. Boards, regulators, and executives now expect clear, defensible answers: Are we resilient? What would a real attacker do here? Where should we invest? Modern Red Teaming provides those answers. In this webcast, Trevin Edgeworth, Red Team Practice Director at Bishop Fox, breaks down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions. Key Takeaways Top Use Cases for Red Teaming: Identify the attack paths that matter most and test your defenses the way adversaries actually operate. Why Red Teaming Now: AI-driven threats and regulatory pressure make adversarial validation essential for proving real-world resilience. Informing Tough Budget Decisions: Use Red Team evidence to justify critical investments, redirect wasted spend, and communicate risk in business terms. What We Learn from Red Teaming: Understand where controls fail, how your team performs under pressure, and which risks require immediate action. Chapters: 0:00 Introduction to Red Teaming 1:34 Insights for Security Executives 3:24 Trevin's Background and Experience 5:02 Common Reasons for Red Team Engagements 8:24 Resource Allocation and Vulnerability Assessment 11:06 Validation of Security Measures 13:52 Assessing Human Element in Incident Coordination 15:38 Evolving Threat Landscape 24:57 Data Poisoning vs. Data Theft 28:44 Understanding SaaS and Cloud Security 35:16 Human Factors in Security Decisions 37:06 Red Teaming as a Defensive Strategy 42:04 Choosing the Right Red Team Provider 46:37 Tailoring Red Team Engagements 48:42 Types of Findings from Red Team Operations 50:12 Personal Insights on Red Teaming 51:32 Running Red Teams with Existing Controls #redteaming #redteam #applicationsecurity