Professional ethical hackers train and conduct “War Games” with clients as a two to three day program to improve cyber readiness.
To improve your organization’s effectiveness at responding to high-risk cyber incidents, our ethical enterprise hackers:
- Provide your personnel training, including scenario-specific table-top exercises
- Conduct live exercises with them to practice what they were taught with the tools they have
- Assess the strengths and weaknesses of their war game performance
Table-top exercises help connect-the-dots among: technology, policy, and process
Why You Need Threat EmulationMilitary organizations have long conducted war games to educate and hone the skills of their soldiers, to improve the organization’s overall military preparedness. Military experts do not argue whether exercises should be conducted but how many should they run, for what scenarios, with what constraints.
The need for cyber war games for the enterprise is far greater. The enterprise can be attacked on any given day, again and again, with absolutely no warning. It is the unknown security holes that executives should fear most. The known ones can be fixed before hackers use them.
These war games help expose:
- Flaws in your security policies and practices
- Misunderstandings amongst your personnel as to their individual roles and procedures
- Under-appreciated inter-dependencies among personnel/roles
- Misconfigurations of tools that permit something that ought to be blocked or fail to capture data vital to responding effectively
Threat Emulation Scenarios
- Targeted malware attack
- Compromised email system
- Critical denial of service
- Lateral intruder movement
- Domain controller breach
- Mass data exfiltration
- Customer database leak
- Business partner hacked
- 3rd party breach notification