Devoteam Cyber Trust employs a Red Teaming methodology based on the best practices available in the market, the TIBER EU Framework and MITRE ATT&CK framework:
Threat Intelligence Based;
Obtain Dark Web information;
Realistic scenarios;
Red Teaming details confined to selected staff;
Focused on objectives and critical functions;
Extended time - low and slow;
Stealth, trying to avoid detection;
Enables organisation to measure It’s Cyber-Resilience;
Use of social engineering;
Targets People, Processes and Technology;
A Red Teaming attack execution may comprise the following steps: