The Cyber Threat Perspective cover image

Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing

The Cyber Threat Perspective

00:00

What are the core components of an Assume Breach methodology?

Spencer outlines endpoint evaluation, Active Directory/network review, and security monitoring as the three pillars.

Play episode from 16:25
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app