Offence is the best defence. Cybercrime, industrial espionage or any other kind of breach of IT systems is always unexpected and the hackers behind it don't work according to the testing manual. You can prevent all this by going on the attack, along with Secura.
Red Teaming Plan of attack
With Secura in the role of attacker, you can discover how well prepared your organisation is for real cybercrime. You decide, in consultation with Secura's consultants, against which components of your digital business you would like to employ a Red Teaming assignment.
Subsequently, our consultants will go on the attack and attempt to make off with your crown jewels in any way possible. Depending on the target, Secura will use a mixture of offensive and testing techniques, such as social engineering, Advanced Persistent Threats (APTs), penetration testing internal networks, attacks from the internet, etc.
Red Teaming is a precision instrument; the outcome will demonstrate how vulnerable or well defended your organisation is against targeted attacks. This will enable you to take additional defensive measures and raise the IT security awareness of the organisation as a whole.
We will record the outcomes of a Red Teaming assignment in a clear report with extensive risk analysis and recommendations on all levels.
For more details on our offered services as well as the assessment process, please check our Red Teaming factsheet.
Presentation Red Teaming
Click here for a brief report and the recordings of the Red Teaming session by Neal Conijn, Senior Consultant Red Teaming & Intelligence at Sosecure and Roy Duisters, Senior Security Specialist at Secura, during Secura's annual security conference Black Hat Sessions Part XVI on June 14th, 2018.
Case study: “Rise of the Red Teams" during Infosecurity.nl by Ralph Moonen
Ralph Moonen, technical director at Secura, presented his view on what makes a Red Teaming exercise truly worthwhile, and share his experiences in recent projects. Several topics will be highlighted, including social engineering, threat intel uses and pitfalls. Rise of the Red Teams presentation in PDF