Table of Contents
Preface
Section 1: Embracing the Red
Chapter 1: Establishing an Offensive Security Program
Defining the mission – the devil's advocate4
Getting leadership support5
Convincing leadership with data5
Convincing leadership with actions and results6
Locating a red team in the organization chart6
The road ahead for offensive security 7
Building a new program from scratch7
Inheriting an existing program7
People – meeting the red team crew 8
Penetration testers and why they are so awesome!9
Offensive security engineering as a professional discipline9
Strategic red teamers10
Program management10
Attracting and retaining talent10
Diversity and inclusion12
Morale and team identity13
The reputation of the team14
Providing different services ...
Get Cybersecurity Attacks – Red Team Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.