BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:6e26f314-c6b7-4482-ac8c-c4dbad54eed9
DTSTAMP:20260519T093043Z
SUMMARY:Breaking the Attack Chain
DESCRIPTION:Despite the rising tide of security maturity\, targeted attack 
 chains are often successful due to systemic weaknesses in how modern IT ad
 ministrators and blue teams operate. This talk gives the attacker's perspe
 ctive on how common attack chains can be stopped before they spiral out of
  control.\nThis talk is fueled by two red team operators field experience 
 in attacking modern enterprise environments. It will cover various tactics
  and techniques that are used with high success during red team engagement
 s\, as well as specific countermeasures that would hamper the success of t
 he described attack chains. The speakers will cover a hypothetical red tea
 m style engagement\, starting from a limited-knowledge basis on the Intern
 et\, moving to an internal foothold\, leading to data compromise. This tal
 k will focus on technical details at an executive level\, and will be perf
 ormed in a "debrief" style with no technical specifics or demos.\n\nSpeake
 r(s): Corey Ham\, Matt Eidelberg\n\nLocation: Red Team Vlg\n\nDiscord: htt
 ps://discord.com/channels/708208267699945503/726477357820411944\n\nEvent s
 tarts: 2020-08-09 11:00 (11:00 AM) PDT (UTC -07:00)\n\nEvent ends: 2020-08
 -09 12:00 (12:00 PM) PDT (UTC -07:00)\n\nFor the most up-to-date informati
 on\, please either visit https://info.defcon.org\, or use HackerTracker\, 
 which is available for iOS and Android. This is an automated message\, and
  this data was last modified 2020-08-02T05:07 (UTC).
URL:https://forum.defcon.org/node/234340
DTSTART:20200809T190000Z
DTEND:20200809T200001Z
LOCATION:Red Team Vlg
END:VEVENT
END:VCALENDAR
