In this presentation, Jesse Roberts will delve into an advanced approach in cybersecurity evaluations. Instead of asking if a system can be breached, this model operates on the assumption that a breach has already occurred. This shift in perspective encourages a deeper and more holistic examination of security postures, allowing testers to identify latent vulnerabilities and examine the true depth of a system's defensive capabilities. By adopting the "Assumed Breach" methodology, organizations can better prepare for sophisticated threats, ensuring that even when initial defenses are bypassed, subsequent layers remain robust and impenetrable.
past_events