
SCYTHE's VP of Research & Engineering, Tim Schulz, will outline the importance of different execution methods in continuous security testing efforts and how they can be executed using the SCYTHE BAS+ platform.
Execution methods are the ways in which adversaries can execute techniques and procedures on systems. MITRE ATT&CK® lists most execution methods attributed to adversary use under the Execution Tactic. While ATT&CK doesn't contain all execution methods possible, it is a great place to start for a discussion on its importance!
History of execution methods and why they are a challenge for defenders
Common execution methods leveraged by adversaries and how to perform those using SCYTHE
What do you need?
All you need is a web browser on a workstation/laptop (no iPads, sorry).
*All attendees will receive a recording/slides post-session.