A Red Team Exercise

Presented at The Next HOPE (2010), July 17, 2010, 2 p.m. (60 minutes).

Shall we play a game? This talk will focus on full scope security assessments and stealing intellectual property in five easy steps. It will take the form of a game that divides the audience into attack and defend teams for a builder vs. breaker educational workshop. Included in the discussion will be physical, electronic (network, application, wireless, telecom, and cellular), and intelligence gathering techniques used for offensive projects.


Presenters:

  • Tom Brennan
    Tom Brennan cofounded a niche critical infrastructure services provider that offered protection of U.S. critical infrastructures with red-team services. He has led teams by example since serving with the United States Marines during the first Gulf War. Brennan has over a decade of hands-on experience in information security, as well as industry accreditations such as the Certified Information Systems Security Professional (CISSP), National Security Agency clearance, INFOSEC Assessment Methodology (NSA-IAM), Certified Ethical Hacker (C|EH), and ISACA Certified Information Security Manager (CISM). In 2007, Brennan was appointed by his peers to the global board of directors of the Open Web Application Security Project (OWASP) Foundation (http://www.owasp.org) as a guide for over 21,000 individuals across 160 chapters worldwide. Additionally, he serves as president of the 1100-member OWASP New York/New Jersey chapter, which he founded in 2004 after his tenure with the FBI Infragard program.

Links:

Similar Presentations: