In the complex world of cyber security, organisations face constant challenges from sophisticated cyber threats, ranging from social engineering attacks, such as phishing, through to full-scale network intrusion and ransomware.
Leonardo’s Adversary Emulation (our Red Teaming service) focuses on finding and validating security flaws that can be exploited by malicious attackers, testing in advance the measures already adopted by organisations.
Red Teaming delivers a safe real-world adversary emulation of a cyber-attack against your organisation or digital system. It is based on current real world and current tactics, techniques and procedures of specific cyber threat actors executed safely across a marshalled cyber kill chain.
Leonardo’s Adversary Emulation services aim to provide customers with a comprehensive picture of their security posture in terms of protection capabilities, vulnerabilities, secure software development and internal users’ security awareness, to provide real confidence in the implementation of an organisation’s security controls.
Our services include:
Full-Spectrum Emulation: Advanced persistent threat emulation combining physical, logical and socio-technical threat vectors and capabilities. This is Leonardo’s most advanced emulation capability.
Multi-Spectrum Emulation: Advanced persistent threat emulation for attackers at a distance using logical and limited socio-technical threat vectors.
Single Spectrum: Logical advanced persistent threat emulation using cutting edge tooling that replicates Advanced Persistent Threat (APT) presence on the interior of your network deployment.
Purple Teaming: Planned exercises with your blue team to enhance their capability in detecting and responding to live threats within your environment.
OSINT (Open-Source Intelligence): A comprehensive review of your company’s presence from publicly accessible information, combined with threat intelligence analysis, highlights potential vulnerabilities an adversary may exploit to gain a foothold.
Vulnerability Assessment: Identifies vulnerabilities in customer systems and defines a remediation plan, prioritising activities based on the criticality of the identified security issue.
Penetration testing: Takes vulnerability assessments one step further by understanding the actual security posture of a system by attempting to exploit identified vulnerabilities.
Social Engineering: Assessing the awareness and attentiveness of the customer’s employees with respect to cyber security issues, by conducting simulated attack campaigns that enable employees to identify and avoid potential malicious elements in the future.