Mastering Red Teaming in Critical Infrastructure
02-10, 11:00–11:50 (Europe/Amsterdam), Boardroom

Red Teaming in operational technology (OT) networks is crucial for the cybersecurity of our critical infrastructure. This approach goes beyond identifying vulnerabilities, aiming to understand networks deeply and learn from actual attacks, thereby enhancing overall cybersecurity resilience.


In today's world, where cyber threats are a real danger to our critical infrastructure, it's crucial for security experts to step in and protect these vital networks. We're seeing more and more sophisticated cyber attacks, and we need to be ready with effective defenses.

Red Teaming is one key approach. This method involves simulating realistic attacks to test our systems. While it's commonplace in companies that mainly focus on IT networks, it's not used as much in the networks and systems that power our countries, known as operational technology (OT).

The way to use Red Teaming in these critical areas needs careful thought. It's not just about finding weak spots; it's about really understanding these networks and designing tests that mimic real threats. By learning from actual attacks executed in this sector, we can gain valuable insights into the effectiveness of these strategies.

This isn't just playing defense; it's about being one step ahead. It's a chance for security professionals to use their skills where they're most needed. By doing this, we can keep our essential services safe and keep them running smoothly in the face of growing cyber challenges.


Language

English

Ben Brücker brings a decade of experience to his roles as a Security Specialist and the Red Teaming Manager at Secura. His expertise in the field of cybersecurity is underscored by a wide-ranging interest in social engineering, penetration testing, and initial access techniques. At Secura, he integrates these specialties to enhance the company's Red Teaming services.

Beyond his primary responsibilities, Ben is involved in sharing his knowledge and experiences. He serves as a trainer for various courses, including Secure Programming, Mobile Security, and Threat Modeling, helping others in the field to grow and learn. Driven by a sense of gratitude to the infosec community, Ben actively engages in open sourcing tools and presenting at industry conferences, aiming to contribute constructively to the broader cybersecurity landscape.