IT Summit - Spring
Tuesday-Wednesday, April 19-20, 2016

SynerComm's 14th Annual IT Conference

Registration Closed

Abstract

Audits and vulnerability assessments alone do not provide a complete assessment of business risk. This talk will go in detail to help you determine what a quality pentest should look like. Whether it's SynerComm performing your next project or another organization, you deserve to know how to identify quality pentests. In this talk we will take a very transparent look into pentest methodology straight from experienced pentesters. We'll explain tests your next pentester should be performing, how they should communicate with your team, and most importantly, what makes up a quality report. (Due to the highly transparent view into SynerComm's methodologies and deliverables, we ask that no vendors or competitors attend)

Presented by

SynerComm logo

Casey Cammilleri

Sr. Information Assurance Consultant
SynerComm