Tiger Team Assessments, also known as Red Teaming, is the speciality of HACKNER Security Intelligence and is in this form a very unique service on the European market. The term describes a realistic security assessment of a company to identify targeted attacks caused by industrial and economic espionage, executed by competitors as well as other nations.
HACKNER Security Intelligence works together with the client to identify possible and realistic attack scenarios in form of a risk analysis. Those scenarios are then rated according to their impact on the business and their likelihood. The following practical assessment confirms the identified threats, helps to find effective counter measures and supports in finding possible new overlooked attack points.
When performing a Red Team Audit we use techniques from the following areas:
- IT Penetration Tests,
- Social Engineering and
- Physical Security Assessments.
In addition, we use intelligence techniques to enhance the effectiveness and chances of our attacks. Therefore, we also use information from the so-called Open Source Intelligence (OSINT) area, where we try to collect internal information about a target by using solely public available sources. Tiger Team Assessments are the only possibility for a company to put their implemented security measures as a whole to a realistic test. Therefore, Tiger Team Assessments are very important instrument in the process of securing a business as a whole.
In all engagements we work close together with our clients to discuss the exact goals, like stealing data from the CFO's notebook locked in a specific drawer, and approach of the assessment. This helps to execute them more effectively and to keep the risk for both parties to a minimum. Most of the time, just very few people from the management are informed about the execution of the security check in order to test with most realistic conditions.
Typical goals for a Tiger Team Assessments are:
- Check different possibilities to get access to a building
- Get access to a manager's office (CEO, CFO, etc.)
- Get access to the server room
- Get access to a research lab
- Steal information stored on a notebook
- Steal information stored on a central server
- Steal printed information stored in a secure location
This listing is not exhaustive and is adapted individually to the client's needs.
HACKNER Security Intelligence executes its projects with a team of specialists, who are experts in their respective field. Tiger Team Assessments are the only way for a company to put their implemented security measures to a realistic test. This not only gives an excellent overview to identify the most effective area to invest the security budget, but helps to secure your company as a whole pro-actively.