Vulnerability scanning has been a staple in cybersecurity for over two decades. Despite its long-standing presence, many organizations still struggle with effectively conducting scans, assessing discovered vulnerabilities, and prioritizing remediation efforts. Furthermore, the emergence of new security products — such as Breach and Attack Simulation (BAS) and External Attack Surface Management (EASM) — has added another layer of complexity, leaving businesses uncertain about whether to invest in these tools and how to maximize their effectiveness.
With limited resources, organizations face the ongoing challenge of deciding which cybersecurity products and services should be prioritized. A poor selection can lead to wasted budgets, while improper deployment may prevent organizations from realizing the full potential of their investments. Drawing from our extensive experience in over 100+ Red Team engagements, this talk will explore the best use cases for various security tools in real-world scenarios and demonstrate how integrating these tools with Red Team Assessment can serve as an effective Proof of Concept (PoC) for evaluating their true impact.
TOPIC / TRACK
SecOps Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701H
LEVEL
Intermediate Intermediate sessions focus on
cybersecurity
architecture, tools, and practical applications, ideal for
professionals with a basic understanding of
cybersecurity.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Red Team
Breach and Attack Simulation
Attack Surface Management
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。