Physical Pen Testing Stories

4 Real-Life Examples of How An expert physical pen tester 'Broke in' & The Lessons-Learned you can take back to your organization


Without conducting a proper physical pen test, how do you know just how secure your facility or workplace really is?

And do you know the full extent of your risk? 

The four organizations touched on in this webinar were quite surprised by their physical pen test results...

(Well, one was probably delighted to hear that their security measures succeeded.)

Listen to these stories of real-life testing engagements that show you the physical attacker's perspective. Takeaway simple, effective remedies to common organizational pain points you can use in your upcoming security planning.


Access the webinar now to hear Michael Smith, Senior Manager of Technology Services & Phil Grimes, Director of Assessments walk through some of their most memorable physical pen testing engagements.

Phil-SquarePhil Grimes, Director of Assessments, uses his extensive knowledge of the digital world (and how to break it) to deliver comprehensive security assessments and penetration services. With hands-on experience dismantling systems and identifying weaknesses in application, physical, digital and mobile security, Phil is a valuable ally for domestic and global organizations. A sought after speaker, Phil has shared his expertise with OWASP and ISSA as well as at several security and technology conferences.

Michael-SquareMichael Smith, Senior Manager of Technology Services, is a proactive problem solver and strong advocate for continued growth and education. He thrives in the complex and constantly changing landscape of cybersecurity. In his seasoned career in cybersecurity, Michael’s expertise has been enlisted across multiple verticals and challenges including strategic planning, policy development, governance and vulnerability management. Michael holds a Masters in Information Assurance and several certificates including his CISSP. He’s a proud board member of CircleCityCon, an information security conference he helped found.

Access The Webinar