Filter By:

Recent Blogs & Podcasts

Back to Insights

Adversarial Simulations - Evolving Penetration Testing

April 18, 2017 | Penetration Testing and Red Teaming
By Dave Kennedy, IANS Faculty

Penetration testing has been given quite a few names over the past few years, including everything from “vulnerability scanning” all the way to “targeted and direct attacks” against organizations. This comes as attacker techniques themselves are shifting based on organizations adding more detection capabilities into their environments. In this webinar, IANS Faculty Dave Kennedy dives into some of the latest attack vectors and discusses why adversarial simulations are some of the most effective methods for building defenses within your organization. 



Please Login to continue

Related Research

1/9/2018 | Ask-an-Expert
Best Practices for Working with Bug Bounty Programs

12/20/2017 | Faculty Reports
Purple Teaming: It’s Easier Than You Think

10/24/2017 | Ask-an-Expert
Meet PCI Standards for Penetration Testing

10/16/2017 | Tools & Templates
Penetration Testing Request-for-Quote (RFQ) Template