These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.
The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise – similar to a “Red Team” engagement.
Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco’s cloud security solutions give our customers the visibility they desire.
It’s funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational…