Packet Pushers

Where Too Much Technology Would Be Barely Enough

  • Podcasts
    • Day Two Cloud
    • Full Stack Journey
    • Heavy Networking
    • Heavy Strategy
    • Heavy Wireless
    • IPv6 Buzz
    • Kubernetes Unpacked
    • Network Break
    • Tech Bytes
    • The Community Show
    • Datanauts (Retired)
    • Priority Queue (Retired)
  • Hosts
  • Articles
    • Tech Blogs
    • Industry News
    • SD-WAN Vendor List
    • Books And Whitepapers
    • Toolbox – IT Resource Collections
  • Library
  • Newsletter
  • Slack
  • Subscribe
  • Sponsor
You are here: Home / Episode / Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore

Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore

Ned Bellavance August 9, 2023

https://media.blubrry.com/packetpushers/content.blubrry.com/packetpushers/D2C_206_Making_The_Most_Of_Red_Teaming_With_Gemma_Moore.mp3

Podcast: Download (35.1MB) | Embed

Red teams attack a customer’s security systems. The idea of a red team, whether as consultants or in-house, is to approach the target like an attacker would. A red team includes technical and human-based exploit and attempts to test defenses, probe for weaknesses, and identify vulnerable systems and processes.

While red teaming is similar to a penetration test, a penetration test tends to limit its scope to a single technology or application and report on all vulnerabilities uncovered. A red team exercise includes the whole organization and seeks to achieve a specific objective like an attacker would–for example, exfiltrate data, install malware, or steal money.

Our guest and guide to red teaming and how to get the most out of the exercise is Gemma Moore, Director at Cyberis.

We discuss:

  • What red teams do
  • Why a company might hire a red team
  • How red teams differ from penetration testing
  • Pitting red teams against blue teams
  • Getting useful outcomes from a red team exercise
  • Red team legal and ethical boundaries
  • Red teaming cloud vs. on-prem infrastructure
  • Limitations of red teaming
  • Yellow teams, purple teams, and orange teams
  • More

Takeaways:

  1. Red teaming can provide effective and realistic ways of assessing the capability of detection and response teams so that gaps in controls and coverage can be identified and addressed
  2. Legal and ethical considerations mean an ethical red team can’t necessarily directly do everything an adversary would do – but working with a red team can allow events to be simulated to assess the impact in a controlled way
  3. For any given organization or budget where a red team is needed to challenge security controls, there is likely to be a variant of red teaming that can be used to help highlight gaps. Typically, the compromise is between lower realism and lower budgets vs. higher realism and higher budgets.

Show Links:

Gemma Moore on LinkedIn

Cyberis Blog

Try Hack Me

Hack The Box

PEN-200: Penetration Testing with Kali Linux – OffSec

Offensive Cyber Security Training – Zero Point Security

Crest

US SANS

About Ned Bellavance

Ned is an Azure Stack MVP, Pluralsight author, IT generalist, and consultant. He hosts the Day Two Cloud podcast on Packet Pushers and co-hosts the Buffer Overflow podcast. He blogs at nedinthecloud.com.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

RSS Day Two Cloud

  • Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore August 9, 2023

RSS Full Stack Journey

  • Full Stack Journey 080: Career Transitions Via Cloud, Infrastructure, And Content Creation With Rishab Kumar July 18, 2023

RSS Heavy Networking

  • Heavy Networking 694: A Network Engineering Roundtable August 11, 2023

RSS Heavy Strategy

  • HS053 IT Facilities in 2023 August 2, 2023

RSS Heavy Wireless

  • Heavy Wireless 008: 3D Printing For Wireless Engineers August 8, 2023

RSS IPv6 Buzz

  • IPv6 Buzz 132: Down The Rabbit Hole Of IPv6 Router Advertisements August 10, 2023

RSS Kubernetes Unpacked

  • Kubernetes Unpacked 032: AI Use Cases For Kubernetes August 11, 2023

RSS Network Break

  • Network Break 442: HashiCorp Swaps Open Source For BSL; Open Enterprise Linux Goes After RHEL August 14, 2023

RSS Tech Bytes

  • Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored) August 7, 2023

RSS YouTube

  • Kubernetes Security And Networking 8: Loading The Cillium CNI May 23, 2023

Recent Comments

  • Shay Jan on Heavy Networking 694: A Network Engineering Roundtable
  • MikeT on Heavy Networking 692: Implementing Practical Network Automation – With Tony Bourke
  • Tony Bourke on Heavy Networking 692: Implementing Practical Network Automation – With Tony Bourke
  • Steve Titzer on Heavy Networking 689: Prepping For Certification Exams With Mary Fasang
  • Adrian Villanueva on Day Two Cloud 200: Coaching For Accidental (And On-Purpose) Managers
  • John Max on HS052 Professional Liability and Qualified Design

PacketPushers Podcast

  • Heavy Networking
  • Day Two Cloud
  • Network Break
  • Briefings In Brief & Tech Bytes
  • Full Stack Journey
  • IPv6 Buzz
  • Community Podcast
  • Heavy Strategy
  • Priority Queue (Retired)
  • Datanauts (Retired)

PacketPushers Articles

  • All the News & Blogs
  • Only the Latest News
  • Only the Community Blogs
  • Virtual Toolbox

Search

Website Information

  • Frequently Asked Questions
  • Subscribe
  • Sponsorship
  • Meet The Hosts
  • Pitch Us
  • Terms & Conditions
  • Privacy Policy

Connect

  • Contact The Packet Pushers
  • Join Our Slack Group
  • Subscribe To Podcasts
  • Subscribe To Newsletter
  • Become A Sponsor
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

© Copyright 2023 Packet Pushers Interactive, LLC · All Rights Reserved