Abstract

A red team is an independent group that challenges an organization to improve its effectiveness. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders.

Likewise the concept is now integrated with the Infosec arena as well. 'What', 'Why' and 'How' of this concept will be discussed in brief. Below mentioned is an outline to be continued down to 4 series including pointers such as:

• Abstract
• Security Assessment v/s Engagement
• Types of Security Assessment
Threat Assessment
Risk Assessment
Security Compliance
• Types of Security Engagement
Code Review
Vulnerability Assessment
Penetration Testing
Red Team Engagement
• Vulnerability Assessment v/s Penetration Testing
• Red Teaming - A new age security operational phenomena
Interaction and Meet-up - RFP
Scoping - Scope of Work and Deliverables
Authorization - RFA - Request for Approval
Red Team Engagement Methodology
Red Team Engagement Analysis
Standard Technical cum Executive Reporting
• Beneficiary to Organizations - Use Cases
Organized Crime
Spy and Intelligence
Cyber Terrorist
Journalism and Activists
• Penetration Test v/s Red Teaming
• Red Team Methodology
Planning and Intelligence
The Exploitation to Breach
Command and Control
Lateral Movement
Red Team Exercise Analysis
• Red Teaming - Limitations
• Red Teaming v/s Blue Teaming
• Sample Demonstrations
• Conclusion

The presentation and the entire chapter-wise content is to be made available to the audience for references.

Speaker

Shritam Bhowmick

I do penetration tests. I do Web Application Security, former aspirant researcher @Information Security and current Red Team Lead.

Timing

Starts at Saturday July 04 2015, 04:30 PM. The sessions runs for 40 minutes.

Resources