Simulating Criminal Hackers to Strengthen Security

Date TBA

Criminal hacking and unauthorized digital intrusions are at an all time high and we frequently witness cyber espionage play out on a global stage. Still, public understanding of the techniques employed to accomplish these digital intrusions remains stagnant. Meanwhile, technology systems continue to grow in complexity as layers of abstraction enable building intricate systems without fully understanding the supporting technology. These realities cumulate into an inability to properly defend information assets. In other words, things get “hacked” because we don’t understand what we are protecting or who we are protecting it from. To combat this digital fog of war modern enterprises deploy Red Teams to simulate the adversary. In this session, learn how and why it pays to play the bad guy.





Programming descriptions are generated by participants and do not necessarily reflect the opinions of SXSW.

Programming descriptions are generated by participants and do not necessarily reflect the opinions of SXSW.

photo of Josh Schwartz

Josh Schwartz

Verizon Media

Primary Access
Platinum Badge
Interactive Badge
Secondary Access
Music Badge
Film Badge