0-10 subscribers
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Podcast đáng để nghe
TÀI TRỢ BỞI


1 Understanding the Elegant Math Behind Modern Machine Learning 1:14:43
Exploring Offensive Security with CrowdStrike Red Teamers
Manage episode 448910420 series 3490818
If a business wants to know what an adversary might be capable of, they can seek the help of a red team. These cybersecurity professionals are tasked with emulating adversary activity to achieve specific objectives in their clients’ environments. Their goal is to find an organization’s weaknesses — before a real adversary does — so it can strengthen its security posture. But what does a red team actually do, and who are the people on these teams?
In this episode, Cristian is joined by CrowdStrike Director of Professional Services Vincent Uguccioni and Professional Services Principal Consultant Brent Harrell to dive into all things red teaming. Both seasoned experts with fascinating backgrounds, Vincent and Brent define what red teaming is (and what it isn’t), explain how it has evolved, debunk common misconceptions about what red teamers do and explain the value of the many different skills the members of a red team have.
The goal of the red team is to help, not hurt. Red teamers may need to think like an adversary when they’re navigating a client environment, but their broader strategy involves collaborating with the client and blue team to guide remediation and improve the client's security. Vincent and Brent also walk us through the process of a red team engagement, from initial client discussions to final reporting, and share how they adjust their approaches as adversary techniques evolve. And if you’re interested in becoming a red teamer, they share some guidance for that as well.
On a related note, we recently introduced CrowdStrike AI Red Team Services. Read our blog for more details: https://www.crowdstrike.com/en-us/blog/crowdstrike-launches-ai-red-team-services/
46 tập
Manage episode 448910420 series 3490818
If a business wants to know what an adversary might be capable of, they can seek the help of a red team. These cybersecurity professionals are tasked with emulating adversary activity to achieve specific objectives in their clients’ environments. Their goal is to find an organization’s weaknesses — before a real adversary does — so it can strengthen its security posture. But what does a red team actually do, and who are the people on these teams?
In this episode, Cristian is joined by CrowdStrike Director of Professional Services Vincent Uguccioni and Professional Services Principal Consultant Brent Harrell to dive into all things red teaming. Both seasoned experts with fascinating backgrounds, Vincent and Brent define what red teaming is (and what it isn’t), explain how it has evolved, debunk common misconceptions about what red teamers do and explain the value of the many different skills the members of a red team have.
The goal of the red team is to help, not hurt. Red teamers may need to think like an adversary when they’re navigating a client environment, but their broader strategy involves collaborating with the client and blue team to guide remediation and improve the client's security. Vincent and Brent also walk us through the process of a red team engagement, from initial client discussions to final reporting, and share how they adjust their approaches as adversary techniques evolve. And if you’re interested in becoming a red teamer, they share some guidance for that as well.
On a related note, we recently introduced CrowdStrike AI Red Team Services. Read our blog for more details: https://www.crowdstrike.com/en-us/blog/crowdstrike-launches-ai-red-team-services/
46 tập
Tất cả các tập
×
1 China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report 34:00

1 A Deep Dive into DeepSeek and the Risks of Foreign LLMs 27:26

1 Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell 34:26

1 See You I-Soon: A Peek at China’s Offensive Cyber Operations 36:13

1 The Most Prolific Adversaries and Threats of 2024 33:01

1 Cross-Domain Attacks: Know Them, Find Them, Stop Them 40:00

1 LIMINAL PANDA and the Implications of Global Telco Targeting 39:59

1 Exploring Offensive Security with CrowdStrike Red Teamers 47:39

1 The Latest in China-Taiwan Cyber Tensions 33:30

1 How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown 53:35

1 Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense 35:24

1 Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024 14:12

1 Intern Spotlight: Starting A Cyber Career with CrowdStrike 36:57

1 Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA 31:17

1 Talking OT Security with Fernando Madureira, Global CISO of Cosan 20:54
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.