Devoteam Cyber Trust employs a Red Teaming methodology based on the best practices available in the market, the TIBER EU Framework and MITRE ATT&CK framework:
Threat Intelligence Based;
Obtain Dark Web information;
Realistic scenarios;
Red Teaming details confined to selected staff;
Focused on objectives and critical functions;
Extended time - low and slow;
Stealth, trying to avoid detection;
Enables organisation to measure It’s Cyber-Resilience;
Use of social engineering;
Targets People, Processes and Technology;
A Red Teaming attack execution may comprise the following steps:
Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.