1. Moscone West 2009

Offensive security practitioners have a wide array of tools and tactics to breach perimeters and bypass controls. Yet our efforts to enact change are often abated by organizational positioning, cognitive biases and misunderstanding. This talk will explore where the boundaries for red teams can expand and strategies to enact security behavior change at scale both internally and technology communities at large.

Pre-Requisites: A fundamental understanding of Security Engagement (culture, human behaviors, social engineering basics), offensive security / red team fundamentals (i.e. operations, assume breach, protect-defend-respond).

Participants: