18 - 20 October 2016 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Tiger Team Assessments / Red Teaming

Tiger Team Assessments / Red Teaming

LOGO_Tiger Team Assessments / Red Teaming

Tiger Team Assessments / Red Teaming

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Tiger Team Assessments, also known as Red Teaming, is the speciality of HACKNER Security Intelligence and is in this form a very unique service on the European market. The term describes a realistic security assessment of a company to identify targeted attacks caused by industrial and economic espionage, executed by competitors as well as other nations.

HACKNER Security Intelligence works together with the client to identify possible and realistic attack scenarios in form of a risk analysis. Those scenarios are then rated according to their impact on the business and their likelihood. The following practical assessment confirms the identified threats, helps to find effective counter measures and supports in finding possible new overlooked attack points.

When performing a Red Team Audit we use techniques from the following areas:

  • IT Penetration Tests,
  • Social Engineering and
  • Physical Security Assessments.

In addition, we use intelligence techniques to enhance the effectiveness and chances of our attacks. Therefore, we also use information from the so-called Open Source Intelligence (OSINT) area, where we try to collect internal information about a target by using solely public available sources. Tiger Team Assessments are the only possibility for a company to put their implemented security measures as a whole to a realistic test. Therefore, Tiger Team Assessments are very important instrument in the process of securing a business as a whole.

In all engagements we work close together with our clients to discuss the exact goals, like stealing data from the CFO's notebook locked in a specific drawer, and approach of the assessment. This helps to execute them more effectively and to keep the risk for both parties to a minimum. Most of the time, just very few people from the management are informed about the execution of the security check in order to test with most realistic conditions.

Typical goals for a Tiger Team Assessments are:

  • Check different possibilities to get access to a building
  • Get access to a manager's office (CEO, CFO, etc.)
  • Get access to the server room
  • Get access to a research lab
  • Steal information stored on a notebook
  • Steal information stored on a central server
  • Steal printed information stored in a secure location

This listing is not exhaustive and is adapted individually to the client's needs.

HACKNER Security Intelligence executes its projects with a team of specialists, who are experts in their respective field. Tiger Team Assessments are the only way for a company to put their implemented security measures to a realistic test. This not only gives an excellent overview to identify the most effective area to invest the security budget, but helps to secure your company as a whole pro-actively.

Security Assessments

LOGO_Informationssicherheit & Unternehmensschutz

Trainings & Coaching

LOGO_Trainings & Coaching

VULCOM - Vulnerability Management

LOGO_VULCOM - Vulnerability Management

There are no entries in your notes.

Show notes

Order your it-sa ticket online in our TicketShop. Save your ticket now!


The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.