ITsec independently assesses the operational effectiveness of your organization’s cyber security, known as Red Teaming. ITsec’s Red Team simulates targeted cyber-attacks on your information crown jewels. The purpose of the attack is to map to what extent your organization is resilient.
“ITsec simulates targeted cyber-attacks on your organization”
Is your organization capable to identify cyber-attacks, protect your crown jewels, detect cyber-attacks, respond to an attack and, as soon as possible, recover from the effect of such an attack? First ITsec, in consultation with you, determines the relevant attack scenario’s. If wanted, ITsec uses so called threat intelligence. Which means, different techniques are used to map real cyber security threats and to attack your organization.
The techniques ITsec uses are, for example, Open Source Intelligence (OSINT), Human Intelligence (HUMINT) and Advanced Persistent Threats (APT). OSINT is the collection of information and intelligence from publicly available sources. HUMINT is the collection of information and intelligence through interpersonal contact. APT is the research for technical possibilities to gain access to data without notice and for a long period.
The assessment of ITsec begins inconspicuous with gathering as much information as possible (Threat Intelligence). Step-by-step, the research extends to a level where your internal processes should signal the simulated cyber-attacks (Red Teaming). With the use of Red Teaming, you will receive a concrete advice that will help you improve your cyber security.