![Talkin' Bout [Infosec] News cover image](https://share.snipd.com/share-image/resize?url=https%3A%2F%2Fimg.transistorcdn.com%2FUAhpjUNHpNuybv4SblS0r2QDlIgiJh1YYqyW2ffruGg%2Frs%3Afill%3A0%3A0%3A1%2Fw%3A1400%2Fh%3A1400%2Fq%3A60%2Fmb%3A500000%2FaHR0cHM6Ly9pbWct%2FdXBsb2FkLXByb2R1%2FY3Rpb24udHJhbnNp%2Fc3Rvci5mbS8yMzEy%2FZTE3ZDNlNjI5YTcw%2FZjAzNzNmOWQ4OGRm%2FMWRiZS5qcGc.jpg&width=320&height=320)
Talkin’ About Infosec News – 6/21/2023
Talkin' Bout [Infosec] News
00:00
The Importance of Attack Emulation in Pen Testing
John Defterios: I want to talk about the topic of pen test being replaced by attack emulation. He says there's obvious places where it falls short, such as initial access vectors and password spray. But one thing that attack emulators shines is for repetitive things like group policy preference files he says.Defterios: You can literally be validating every single week through attack emulate that your hundreds of prevention and protections are working.
Play episode from 39:07
Transcript


