,Cybersecurity Attacks
, Table of Contents
Preface
Section 1:
Embracing the Red
1
Establishing an Offensive Security Program
Defining the mission – the
devil's advocate 4
Getting leadership support 5
Convincing leadership with data 5
Convincing leadership with actions
and
results 6
Locating a red team in the
organization chart 6
The road ahead for offensive
security 7
Building a new program from
scratch 7
Inheriting an existing program 7
People – meeting the red team crew
8
, Penetration testers and why they
are
so awesome! 9
Offensive security engineering as a
professional discipline 9
Strategic red teamers 10
Program management 10
Attracting and retaining talent 10
Diversity and inclusion 12
Morale and team identity 13
The reputation of the team 14
Providing different services to
the organization 15
Security reviews and threat modeling
support 15
Security assessments 16
Red team operations 16
Purple team operations 16
Tabletop exercises 17
Research and development 17
Predictive attack analysis and incident
response support 17
Additional responsibilities of
the offensive program 18
Security education and training 18
Increasing the security IQ of the
organization 18
, Table of Contents
Preface
Section 1:
Embracing the Red
1
Establishing an Offensive Security Program
Defining the mission – the
devil's advocate 4
Getting leadership support 5
Convincing leadership with data 5
Convincing leadership with actions
and
results 6
Locating a red team in the
organization chart 6
The road ahead for offensive
security 7
Building a new program from
scratch 7
Inheriting an existing program 7
People – meeting the red team crew
8
, Penetration testers and why they
are
so awesome! 9
Offensive security engineering as a
professional discipline 9
Strategic red teamers 10
Program management 10
Attracting and retaining talent 10
Diversity and inclusion 12
Morale and team identity 13
The reputation of the team 14
Providing different services to
the organization 15
Security reviews and threat modeling
support 15
Security assessments 16
Red team operations 16
Purple team operations 16
Tabletop exercises 17
Research and development 17
Predictive attack analysis and incident
response support 17
Additional responsibilities of
the offensive program 18
Security education and training 18
Increasing the security IQ of the
organization 18