What does a hack look like? If you ask pen testers, they will talk to you about malware, Remote Desktop Protocol (RDP) issues and social engineering. They will focus on techniques and tools that make those things happen.
However, if you ask security analysts, they will talk about the same techniques and tools, but from a completely different perspective. They’ll talk about log files, security information and event management (SIEM) read-outs and network visualization.
The discussion is kind of like the parable of the blind men and the elephant: each person describes a different part of the elephant’s body and then concludes what the animal is based on their experience. The cyberworld – like any part of the IT world – can lead to compartmentalized, siloed ways of thinking.
In this next Office Hours with James, Dr. James Stanger will demonstrate an attack from both perspectives. Along the way, he’ll not only talk about techniques and tools from the pen tester/red team perspective, but also from the security analyst/blue team perspective. Join him to learn essential pen testing and security analytics skills, the importance of the red team and the blue team working together and what today’s attacks look like from both perspectives.
What: Office Hours with James Webinar: Red Team, Blue Team: Two Sides of the Same Coin
When: Anytime! Click to watch the webinar on demand
How Long: 1 Hour