27
Sep
2019

Taking the Offensive
A decade after its formation, Cyber Command is refocusing to take a more active role in defending against cyber attacks. This year, its Cyber Protection Teams (the “blue team”) was directed to search for and deter adversaries and malicious activity, as opposed to simply bolstering network infrastructure. With hackers and other ill-intentioned forces bolder and more resourceful than ever, it’s become key for national intelligence to do more than focus on mission protection. Personnel have a host of new responsibilities that come with a more offensive approach to cybersecurity, and as a result, training has become more important than ever. The adversary featured in Cyber Flag’s simulation was designed to obtain information as well as to cause disruption, not just in the IT infrastructure but in the system’s operational technology. Ideally, the blue team would not only block this attempt, but it would hunt down the malicious invaders to eradicate any lingering threat of a breach. Above all, the training is an adaptive team-building experience. According to Rear Admiral John Mauger, Cyber Command’s director of exercises and training, “the environment is really intended to challenge the teams both as individuals and their knowledge as analysts and operators—but more importantly as a collective team and their ability to work together.”The Power of Teamwork
While federal agencies are leading the charge to be more assertive in defending their systems, your organization can just as decisively take action against potential threats. Start with a comprehensive evaluation that assesses the effectiveness of your with the prowess of a real human attacker: our Red Team Assessment, which determines system vulnerabilities with a proven process:- Assessment of real-world threat vectors
- Circumvent security systems and controls
- Compromise perimeter/internal systems
- Establish persistent internal connections
- Gain network user account access
- Gain elevated privilege (admin) access
- Identify key systems and databases
- Establish backdoor access to key systems
- Capture sensitive data for validation