1 00:00:01,130 --> 00:00:07,400 So over the last decade or so, technology development has dramatically increased, which can easily 2 00:00:07,400 --> 00:00:10,970 be observed when you have a look at what's in your pocket. 3 00:00:11,770 --> 00:00:13,220 I'm talking about your cell phone. 4 00:00:15,150 --> 00:00:23,580 So therefore, a new form of technology pops up and it finds application fields in the market, bitcoin 5 00:00:24,150 --> 00:00:30,980 cloud, Iot, virtual reality, artificial intelligence and machine learning applications and so on. 6 00:00:31,930 --> 00:00:38,140 Also now, programming languages and frameworks are far more powerful and versatile. 7 00:00:39,060 --> 00:00:43,910 So I'm hoping that they're for this evolution will never end. 8 00:00:44,810 --> 00:00:46,010 Gives me something to do anyway. 9 00:00:46,910 --> 00:00:53,900 Moreover, private and governmental organizations are in such a competition for applying these improvements, 10 00:00:54,530 --> 00:01:00,150 almost all the businesses move partially or completely to it. 11 00:01:01,220 --> 00:01:06,710 They create new web applications, buy new hardware and set up new data warehouses. 12 00:01:07,190 --> 00:01:12,280 Almost everything is automated and even you are part of this system. 13 00:01:13,010 --> 00:01:19,280 So while these technologies completely change the way you do things, they also bring along some threats 14 00:01:19,280 --> 00:01:19,670 with him. 15 00:01:20,360 --> 00:01:26,720 And these threats, they will come into your life and then the organizations that you perhaps work for, 16 00:01:27,110 --> 00:01:34,520 they will overreact or apply too much effort for detection and the protection of their system. 17 00:01:35,400 --> 00:01:41,490 They are so deeply concerned about keeping their data safe, they'll invest millions and millions of 18 00:01:41,490 --> 00:01:49,440 dollars in security programs to prevent possible data breaches, and attackers can discover new ways 19 00:01:49,440 --> 00:01:51,360 of manipulating technology. 20 00:01:51,360 --> 00:01:55,400 And then the security programs develop new ways to prevent data breaches. 21 00:01:55,410 --> 00:01:56,940 And it goes on and on. 22 00:01:57,720 --> 00:02:05,370 While defensive security measures can fail, testing the system against the adversaries gains much more 23 00:02:05,370 --> 00:02:06,320 importance. 24 00:02:07,170 --> 00:02:13,610 So penetration testing is the best solution for organizations to accomplish these scenarios. 25 00:02:14,460 --> 00:02:18,120 I mean, testing is not the only way to protect the system. 26 00:02:18,630 --> 00:02:24,950 However, it is one of the most effective ways to identify the weaknesses in the systems. 27 00:02:24,960 --> 00:02:25,250 Right. 28 00:02:26,210 --> 00:02:33,710 So by attempting to circumvent security controls, penetration testing can identify the ways in which 29 00:02:33,710 --> 00:02:41,270 a hacker might be able to do so, the organization will get the idea of how an attacker can gain access 30 00:02:41,270 --> 00:02:45,870 to their system and how they can then stop that attacker to be effective. 31 00:02:46,490 --> 00:02:52,310 And then, of course, that way they can easily identify the negative and positive aspects of their 32 00:02:52,310 --> 00:02:53,100 security system. 33 00:02:53,690 --> 00:02:59,930 So for all these reasons and probably more than I can think of, and you could probably come up with 34 00:02:59,930 --> 00:03:06,470 a whole bunch more, but you can see that all compliance and auditing firms include penetration testing 35 00:03:06,470 --> 00:03:07,730 in their operations. 36 00:03:08,090 --> 00:03:15,020 So with penetration testing, an organization can easily evaluate its security posture.