Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Joshua R Nicholson and Joshua Nicholson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joshua R Nicholson and Joshua Nicholson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cyber Control Testing: New Purple Teaming Revolution

59:15
 
Share
 

Manage episode 407544592 series 3563154
Content provided by Joshua R Nicholson and Joshua Nicholson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joshua R Nicholson and Joshua Nicholson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
The landscape of cyber security threats is evolving, and with it, so are the methods of penetration testing and control validation. Sophisticated organizations now use a continuous purple-teaming methodology that combines offensive testers (Red Teamers) with Cyber Defenders (Blue Teamers) to identify blind spots in their Detection & Response (D&R) controls before a breach occurs. This new approach, called Breach Attack Simulation (BAS), is transforming the way security controls are tested and how analytics are developed. In this episode of our Cyber Security America podcast, we discuss best practices and lessons learned from the purple-teaming revolution. We explore the need for vigilance in monitoring desktop telemetry from EDR solutions, the effectiveness of Network Intrusion Detection Systems (NIDS) sensors and supporting log analytics. The days of simple penetration testing are over, and we explore what to look for in a Breach Attack Simulation managed or in-house capability. Join the conversation and don't miss out on this game-changing episode, packed with expert tips and insights. Listen now on and watch on YouTube at https://www.youtube.com/watch?v=3nDjc6RaZ3Q. #DetectionAndResponse #intelligence #threatintelligence #ThreatHunting #informationsecurity #Podcast #VoiceAmerica #deepseas #charlottebusiness #leader #ciso #cybernews #cyberdefense. Available on #spotifypodcasts,
  continue reading

38 episodes

Artwork
iconShare
 
Manage episode 407544592 series 3563154
Content provided by Joshua R Nicholson and Joshua Nicholson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joshua R Nicholson and Joshua Nicholson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
The landscape of cyber security threats is evolving, and with it, so are the methods of penetration testing and control validation. Sophisticated organizations now use a continuous purple-teaming methodology that combines offensive testers (Red Teamers) with Cyber Defenders (Blue Teamers) to identify blind spots in their Detection & Response (D&R) controls before a breach occurs. This new approach, called Breach Attack Simulation (BAS), is transforming the way security controls are tested and how analytics are developed. In this episode of our Cyber Security America podcast, we discuss best practices and lessons learned from the purple-teaming revolution. We explore the need for vigilance in monitoring desktop telemetry from EDR solutions, the effectiveness of Network Intrusion Detection Systems (NIDS) sensors and supporting log analytics. The days of simple penetration testing are over, and we explore what to look for in a Breach Attack Simulation managed or in-house capability. Join the conversation and don't miss out on this game-changing episode, packed with expert tips and insights. Listen now on and watch on YouTube at https://www.youtube.com/watch?v=3nDjc6RaZ3Q. #DetectionAndResponse #intelligence #threatintelligence #ThreatHunting #informationsecurity #Podcast #VoiceAmerica #deepseas #charlottebusiness #leader #ciso #cybernews #cyberdefense. Available on #spotifypodcasts,
  continue reading

38 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play