top of page

Automating Attacks

Workshop Abstract

 

This workshop will help beginners understand what the latest buzzwords mean such as Atomic Testing, Micro Emulation Plans, and Purple Teaming. With a common understanding, we will then use a lab environment to execute an emulation plan to learn from offensive and defensive outcomes. The lab will first with simple exercises and leverage open-source tools to ensure all attendees are equipped to perform a similar assessment internally.

With the latest advancements of attack and breach simulation tools, many Organizations are still playing catchup to know where to begin. Endpoint detection and response (EDR) tools have become heavily relied upon with default configurations. As an industry, we have pushed a lot of the responsibility of managed service providers without fully understanding what we are signing up for. The need for defenders to understand offensive actions and capabilities has grown to be to ensure controls are working as intended. These types of assessments demonstrate a tools value to the business or create a case for the need of a specific investment.

Audience

Beginners interested in learning about concepts relating to purple teaming, atomic testing, and micro emulation plans should attend this training. Come and learn about these new approaches that both we as security testers and the real bad guys are using to breach organizations and invade their privacy.

Date & Time

September 8, 2023  |  4:00 PM – 6:00 PM

Location

In-Person

Jefferson Community and Technical College (JCTC) - 110 W Chestnut St, Louisville, KY 40202

Your Instructor

Alex Martirosyan

Alex is a Senior Penetration Tester at Wolf’s IT Assurance Services group where he’s responsible for coordinating and conducting penetration testing services for clients in a variety of industries, including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, threat emulation exercises, social engineering, vulnerability assessments, cloud security assessments, and Active Directory security reviews.

Additionally, he has experience working with standards from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS), and leveraging the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework. Alex has over three years of experience performing security assessments and holds certifications from industry-recognized organizations such as Offensive Security and Global Information Assurance Certification (GIAC).

alex martirosyan.png
bottom of page