Security Engineering for Adversarial Emulation and Red Teaming
08-11, 11:30–12:30 (US/Pacific), Main Stage

Securing Engineering is a core element of security. In this session, you will hear how the Obsidian Engineers collaborated with the Red Team to architect and build this year's Obsidian adversary simulation environment. PS: You will be able to make your own too!


Securing Engineering is a core element of security. In this session, you will hear how the Obsidian Engineers collaborated with the Red Team to architect and build this year's Obsidian adversary simulation environment. PS: You will be able to make your own too!

Plug started his journey in computer security in 1996 when he discovered a 2600 magazine, eventually leading him to his first LA2600 meeting in 1998. From that point forward, he has been involved in computer security. He is a Sr. Defcon Blue Team Village member and leads detection and observability at a tech company. In his free time, he enjoys building Legos and playing with synthesizers, and when possible, he volunteers his time to computer security events.

This speaker also appears in:

Scott Brink is a hacker and manager within X-Force Red who specializes in network penetration testing. He graduated with a degree in computing security with a minor in networking and system administration from Rochester Institute of Technology. While there, he was the captain of the school’s team for the Collegiate Penetration Testing Competition. His research includes a presentation at Thotcon 0xA that looked into visitor management systems, where he found 19 zero-day vulnerabilities in these products. He has also presented a workshop at Red Team Village at Defcon 30 about Active Directory.