This meeting has been postponed. Please check back for the new date.
Abstract
Follow a penetration tester through the key stages of an engagement, from preparation to successful execution. Step-by-step we’ll show you how someone can achieve total domain takeover within 30 minutes of entering a target’s offices. Explore the preparation stages, in particular how to use OSINT and a demonstration of practical reconnaissance techniques. Along the way they'll show that accessing CCTV, building and lift management systems are not just the stuff of movies! Learn how they bypass physical security controls and leverage common vulnerabilities so that they can walk away with the keys to the kingdom in under a half an hour. Session will be followed by a Q&A.
Speaker Bio
Paul has over 10 years of cyber security experience. He started out securing networks and is now paid to break into them. Paul has a background in industrial engineering where he familiarized himself with human machine interfaces, telemetry, sensor data, and various other SCADA systems. This experience is now essential for testing and helping to secure Operational Technology. Paul is a regular speaker at technology and security events such as the (ISC)2 Security Conference, where he highlights risks and security flaws in the internet of things, automotive, rail, and maritime sectors.
Must register here ifyou plan to attend.