Lépjen offline állapotba az Player FM alkalmazással!
Episode 101: Visualizing Attack Paths in Active Directory
Manage episode 440534922 series 3382533
In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.
Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.
Here are some highlights from our episode:
- 01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
- 05:08. Why have organizations look at their Active Directory environments
- 11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
- 21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
- 29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments
Resources
- Bloodhound Community Edition
- Episode 62: Inside the 'Spidey Sense' of a Pentester
- What You Need to Know About Hybrid Cloud Environments
- Vulnerability Management Policy Template for CIS Control 7
- CIS Benchmarks List
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 epizódok
Manage episode 440534922 series 3382533
In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.
Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.
Here are some highlights from our episode:
- 01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
- 05:08. Why have organizations look at their Active Directory environments
- 11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
- 21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
- 29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments
Resources
- Bloodhound Community Edition
- Episode 62: Inside the 'Spidey Sense' of a Pentester
- What You Need to Know About Hybrid Cloud Environments
- Vulnerability Management Policy Template for CIS Control 7
- CIS Benchmarks List
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 epizódok
Minden epizód
×Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.