Red Team Workshop
Think & Act Like an Attacker
Red Team Workshop
Workshop | Paid Workshop | English
Sunday, June 23rd, 2019
09:00-17:00
Tel Aviv University - HaMiflat
About
Who is this for:
- Executives (CEO, CIO, CTO, CISO) that want to improve their strategies by understanding attackers.
- Executives & companies that want to build a red team.
- Executives who wish to better utilize red team operations.
- Gain understanding of the offensive hackers’ point of view
- Learn from top Israeli Hackers
- Understand how to combine the attackers and business perspectives
- Setup Red Team activities
- Improve Red Team operations
Registration instructions:
- Register for Cyber Week (click the register button at the top of the page) and finalize your registration process. If you have already registered, please log in to your account
- Click Register for Red Team Workshop. You will be forwarded to the payment page. Please fill the required information. Registration is not complete until your payment has been processed and a confirmation email has been sent to your mailbox
Cancellation policy:
- Please note that the workshop requires a minimum of 8 registrants in order to take place. Otherwise, the workshop will be cancelled. Maximum amount of participants is 25
- 100% refund is guaranteed only if the event is cancelled by the organizer
- There is a 50% cancellation fee if you cancel up to 14 days prior to the workshop
- If you cancel less than 14 days prior to the workshop, you will be charged for the full price of the workshop
- The deadline for registration is the 20th of June
For more information contact Daria Segal, Workshop Manager
Agenda
-
What is Red Teaming?
Ilan Graicer , Entrepreneur, Cyber Security Specialist, Game Designer, Maker and Wildlife Photographer
-
Attackers Point of View (POV)
Matan Scharf , Cybersecurity Strategy Advisor , HARMAN International ; Strategic Advisor , Blavatnik ICRC, Tel Aviv University
-
Establishing Attack Goals & Vectors
Iftach Amit , Chief Security Officer , Cimpress
-
Phase 1: Red Team Methodology & Attack
Ilan Graicer , Entrepreneur, Cyber Security Specialist, Game Designer, Maker and Wildlife Photographer
-
Phase 2: RECONnaissance / Intelligence Gathering
Demi Ben-Ari , Co-Founder & VP R&D , Panorays
-
Phase 3: Operations - Getting Access and Establishing Presence
Nadav Arbel , Founder & CEO , Cyberhat
-
Phase 4: Operations - Pivoting, Exploitation and Exfiltration
Ronen Lago , Co-founder & CTO , CYE
-
Results & Dialogue with Teams and Management
Menny Barzilay , CTO , Blavatnik ICRC, Tel Aviv University ; CEO , Cytactic