Pergi ke luar talian dengan aplikasi Player FM !
Episode 101: Visualizing Attack Paths in Active Directory
Manage episode 440534922 series 3382533
In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.
Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.
Here are some highlights from our episode:
- 01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
- 05:08. Why have organizations look at their Active Directory environments
- 11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
- 21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
- 29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments
Resources
- Bloodhound Community Edition
- Episode 62: Inside the 'Spidey Sense' of a Pentester
- What You Need to Know About Hybrid Cloud Environments
- Vulnerability Management Policy Template for CIS Control 7
- CIS Benchmarks List
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
105 episod
Manage episode 440534922 series 3382533
In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.
Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.
Here are some highlights from our episode:
- 01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
- 05:08. Why have organizations look at their Active Directory environments
- 11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
- 21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
- 29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments
Resources
- Bloodhound Community Edition
- Episode 62: Inside the 'Spidey Sense' of a Pentester
- What You Need to Know About Hybrid Cloud Environments
- Vulnerability Management Policy Template for CIS Control 7
- CIS Benchmarks List
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
105 episod
Semua episod
×Selamat datang ke Player FM
Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.