SiegeCast: Assumed Breach

Part I with Tim Medin

Traditional penetration testing often concede internal access to the tester, but then the tester does a lot of scanning and poking around. This is not representative of most breaches. Most breaches start with a phish and adversary effectively starts with access as one of your users on one of your systems. Are you prepared to defend? In this talk, Tim Medin will discuss the shortcomings of the traditional penetration test, and talk you through ways to deliver (and receive) a higher value penetration test.





Join the Red Siege community Discord server:

You can always reach out to our team at

Find Out What’s Next

Stay in the loop with our upcoming events.