Criminal hacking and unauthorized digital intrusions are at an all time high and we frequently witness cyber espionage play out on a global stage. Still, public understanding of the techniques employed to accomplish these digital intrusions remains stagnant. Meanwhile, technology systems continue to grow in complexity as layers of abstraction enable building intricate systems without fully understanding the supporting technology. These realities cumulate into an inability to properly defend information assets. In other words, things get “hacked” because we don’t understand what we are protecting or who we are protecting it from. To combat this digital fog of war modern enterprises deploy Red Teams to simulate the adversary. In this session, learn how and why it pays to play the bad guy.
Programming descriptions are generated by participants and do not necessarily reflect the opinions of SXSW.