LIVE webinar
Red Team SECURITY

Get the Most Out of a Red Team Exercise 

Davide Girardi | Erik Wilhelmsson

Truesec Tech Talk is finally back –
We’re starting off the year by talking about Red Teams

See webcast

By submitting your email adress you will be able to see the webcast as many times as you want.
  • Hidden
  • Hidden

One size does not fit them all and it is important to choose the right engagement for the right context. Do you want to know if your policies and routines are ready for real-world challenges? Are your investments in equipment and services paying out? Do you simply need more resources for security? 

During this session, our experts Erik Wilhelmsson and Davide Girardi will guide you through when and how it is time to battle test your company with a Red Team exercise.
 

What you’ll walk away with:

  • What is a Red Team 
  • What value you get out of a Read Team exercise
  • When to choose a Red Team based on your objectives 
  • How to choose the right Red Team

Questions?

Have a question you want to be answered during our Tech Talk? Mail it to us at t3@truesec.com

Language:

English

Target groups:

Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.

You can find more info about Red Team here:

Hosts:

Erik Wilhelmsson

Erik is a Penetration tester and Cyber Security Consultant with a passion for critical infrastructureindustrial control systems, and in general breaking stuff. 

Erik’s primary focus is web application securityadvanced persistence threat attack simulation (Red Teaming), and infrastructure testing. 

Davide Girardi

Davide’s main interest areas are advanced persistence threat attack simulation (red team exercises), mainframe security research, custom malware development, custom attack devices and tools, privilege escalation, and lateral movement.He has more than ten years of experience in attacking and defending complex network systems based on Windows, Linux, mainframes, OS X, and other Unix-based operating systems.