Defenders have historically wrestled with a lack of visibility into the attack paths that threaten their environments. Simply knowing where you’re vulnerable isn’t enough; defenders must also understand how these vulnerabilities are likely to be exploited to effectively protect against risks posed to business-critical assets.
During this session, we will uncover attack path mapping and management knowledge that is perceived to be kept only within elite red team circles. Driven by live demonstrations, we will dive into the principles of each and apply them to real-world scenarios of gathering and analyzing attack paths in commonly used identity systems.
Learning Objectives: