Bespoke Attack Simulation assessments
We are able to tailor Attack Simulation engagements to meet your requirements and budgets by selecting only relevant areas of the methodology. This allows you to focus on what is appropriate for your business and still get assurance of your organization’s resilience to attack.
Examples of bespoke Attack Simulation:
- Open source intelligence gathering
- Spear phishing simulation
- Malware delivery / foothold establishment
- Endpoint and server persistence
- Data exfiltration simulation
- Incident response detection
- Incident response analysis
- Incident response prevention
In each of the above cases, the testing can be performed on a zero or partial knowledge basis.