www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:c13  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-Hq8ixhff49pazOxDNuKlmEUQeUyveOZHDkUQXPeFZB6-OI-jPe68ANxndYdnrGOJm3eQilU8pz...
Effective URL: https://www.scmagazine.com/podcast-segment/12471-the-evolution-of-purple-teaming-jared-atkinson-psw-812?utm_source=marketin...
Submission: On January 16 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About



ADVERTISEMENT



Paul's Security WeeklySubscribe
Zero trust, Ransomware, Endpoint/Device Security


THE EVOLUTION OF PURPLE TEAMING – JARED ATKINSON – PSW #812

January 10, 2024


Jared would like to discuss the evolution of purple teaming. Put bluntly, he
believes traditional purple team approaches don’t test enough variations of
attack techniques, delivering a false sense of detection coverage. He would like
to talk about: The shortcomings of red team assessments and why most purple team
assessments are too limited. How the testing landscape and requirements have
changed (especially as organizations now look to validate vendor tools defense
claims). How purple team assessments are evolving with the use of new frameworks
like Atomic Testing. And the importance of building and selecting good test
cases that cover the many ways attack techniques can be modified.



Full episode and show notes

ANNOUNCEMENTS

 * Security Weekly listeners: Cyber threats are evolving — is your organization
   keeping up? The 2023 Cybersecurity Year in Review is Here! Uncover the latest
   challenges and strategic responses in CRA's 2023 Cybersecurity Year in Review
   – sponsored by RSA Conference. From the impact of generative AI to the risks
   of ransomware to navigating new SEC rulings, get ahead for 2024 with your
   free copy. Download the report at securityweekly.com/yearinreview2023

GUEST

Jared Atkinson
Chief Strategist at SpecterOps


Jared is a security researcher who specializes in Digital Forensics and Incident
Response. Recently, he has been building and leading private sector Hunt
Operations capabilities. In his previous life, Jared lead incident response
missions for the U.S. Air Force Hunt Team, detecting and removing Advanced
Persistent Threats on Air Force and DoD networks. Passionate about PowerShell
and the open source community, Jared is the lead developer of PowerForensics,
Uproot, and maintains a DFIR focused blog at http://www.invoke-ir.com.

HOSTS

Paul Asadoorian
Principal Security Evangelist at Eclypsium
0offset
https://securityweekly.com
Bill Swearingen
Founding Partner at TRIFIDENT

Jeff Man
Sr. InfoSec Consultant – Online Business Systems at Online Business Sytems
https://www.obsglobal.com/
Josh Marpet
Executive Director at RM-ISAO

Sam Bowne
Founder at Infosec Decoded, Inc.
https://samsclass.info/
Tyler Robinson
Founder & CEO at Dark Element
trob#6466
http://darkelement.io/


RELATED

Zero trust

CREATING A CERTIFICATION PATH FOR SASE PRODUCTS AND SERVICES – PASCAL MENEZES –
ESW #344

December 20, 2023

Understanding how CyberRatings, NaaS, and SASE combine to make network security
easier to buy and deploy. MEF is an industry association, providing standards,
certifications, and facilitating community discussions. MEF has teamed up with
CyberRatings.org to establish a certification program for SASE services, making
it easier for buyers to understa...
Email security

PRIORITIZING IDENTITY AND GETTING THE FUNDAMENTALS RIGHT – BEZAWIT SUMNER – CSP
#151

December 5, 2023

Prioritizing identity and getting the fundamentals right. We are managing more
identities than ever – people-people, machine-to-machine, and people-machines.
What actions should CISOs be ensuring are being done within the environment to
prioritize identities? Join us as we discuss where Bezwit has focused to enhance
the identity management process....
Cloud Security

THE EVOLVING ROLE OF THE BROWSER IN THE MODERN ENTERPRISE WORLD – NORIKO
BOUFFARD, MARCO GENOVESE – ESW #337

October 26, 2023

In the age of remote and hybrid work, employees are now spending most of their
time in the browser or virtual meetings, making the browser an increasingly
important part of an enterprise's security strategy. According to Gartner, “By
2030, enterprise browsers will be the core platform for delivering workforce
productivity and security software on m...


ADVERTISEMENT



ADVERTISEMENT



ADVERTISEMENT



You can skip this ad in 1 seconds




--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies