The Attacker Perspective: Helping Defenders Understand Attack Path Management
About
Defenders have historically wrestled with a lack of visibility into the attack paths that threaten their environments. Simply knowing where you’re vulnerable isn’t enough; defenders must also understand how these vulnerabilities are likely to be exploited to effectively protect against risks posed to business-critical assets.
During this session, we will uncover attack path mapping and management knowledge that is perceived to be kept only within elite red team circles. Driven by live demonstrations, we will dive into the principles of each and apply them to real-world scenarios of gathering and analyzing attack paths in commonly used identity systems.
Learning Objectives:
Participants will understand basic principles of attack path mapping and management in identity systems so that blue teams can better identify the specific journeys an attacker could take within their organization to access sensitive data or leverage system access to exploit vulnerabilities
Participants will gain knowledge to analyze attack paths in Active Directory and Entra ID in real-world scenarios
Participants will understand actions needed to remediate identified attack paths in identity systems, reducing their organizations’ attack surface
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.