Apr 9, 2020
Compliance, best practices, and regulation drive security programs. These programs pass audit and compliance checks, have robust patch management, and even conduct vulnerability and penetration testing assessments. How do you know if these programs can protect against real threats? In this episode, Joe Vest co-author of the book Red Team Development and Operations shares his thoughts and real-world guidance. Discover how professional red teaming can bridge the gap between security program design and implementation to truly show how robust a security program can stand up a real threat.