How we breach network infrastructures and protect them
We showcased at a client’s corporate event how we technically assess and breach network infrastructures, before attackers do. Throughout the talk a number of questions were answered: what network design mistakes and defective assumptions lead to security breaches? What are the weakest entry points of your network perimeter? How do we leverage our unauthorized access to the network and why? What security controls can help to prevent these breaches and how can you implement them?