Joshua-Platz

Joshua Platz

Senior Consultant

Joshua Platz is a senior consultant in Optiv’s advisory services practice on the attack and penetration team. Joshua’s role is to provide internal and external network penetration testing to determine vulnerabilities and weaknesses in client networks and environments. He specializes in PCI DSS, wireless, social engineering, password cracking, as well as post-exploitation of customer networks.

 

ATT&CK’s Initial Access Adversarial Tactic

· By Joshua Platz ·

By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations spend large portions of their security and IT budget on key security technologies such as firewalls, antivirus and exploitation prevention software, application whitelisting, and vulnerability scanning tools. All of these devices and software work together to harden the infrastructure, in attempt to prevent intrusion.

Continue reading

Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series)

· By Joshua Platz ·

This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of a control.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20

· By Joshua Platz ·

Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an attacker.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 14

· By Joshua Platz ·

The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, and systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical assets based on an approved classification.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 13

· By Joshua Platz ·

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 12

· By Joshua Platz ·

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 8

· By Joshua Platz ·

Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 7

· By Joshua Platz ·

Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 6

· By Joshua Platz ·

Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.

Continue reading

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 5

· By Joshua Platz ·

The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.

Continue reading
(14 Results)