Skip to content
Healthcare

More War Stories From Over 150,000 Pentests


Course
Enroll

Anthony Pillitiere of Horizon3.ai covers prioritizing exploitable weaknesses using likelihood and impact, validating security controls through autonomous offensive engagements, and shifting to continuous attack simulation.

Healthcare organizations invest heavily in vulnerability scanners, EDRs, SIEMs and automated patch management - yet critical exploits persist undetected for months. One organization patched the devastating Zerologon domain controller vulnerability, vulnerability scanners confirmed success, but 18 months later autonomous pentesting revealed six of 10 domain controllers remained exploitable because endpoint protection silently blocked the actual remediation step.

The fundamental problem: nothing in today's security stack understands context, likelihood or impact. Vulnerability scanners assess severity against all CVEs, yet only a fraction have real attack value. When the difference between full domain compromise and protection is a single misconfigured checkbox, continuous offensive validation becomes essential.

The session will cover:

  • Prioritizing exploitable weaknesses using likelihood and impact rather than CVSS scores alone;
  • Validating security controls operate as intended through regular autonomous offensive engagements;
  • Shifting from annual scoped pentests to continuous attack simulation across entire environments.
 

 

Here is the course outline:

Go Hack Yourself: More War Stories From Over 150,000 Pentests

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate