SlideShare a Scribd company logo
4
Most read
5
Most read
19
Most read
InfoSec RedTeam
Building and maintaining a
Penetration Testing Team
as the driving force of the
Security Organizational Structure
First Page :Why RedTeam?
To rescue
MONEY& REPUTATION
First Page :How?
By keeping HACKERS away!
Second Page :Definitions
RedTeam
Independent group that challenges an organization to improve its security.
Penetration TestPenetration Test
Method of evaluating computer and network security by simulating an attack on a
computer system or network from external and internal threats.
Security Operations Center
Centralized unit in an organization that deals with security issues, on an
organizational and technical level.
RedTeam – center of security
RedTeam members are cutting-edge
technical experts in a multitude of IT
domains and are used as consultants
by other services within the security
department.
Alongside with consultancy they also
provide:
-Training
- Mentoring
- Guidance
- Best practices
Functional relationships
The RedTeam provides expert knowledge and share information with all departments
across the Security Department. Just to name a few:
Organizing a RedTeam
Given the sensitive information the team is handling and the necessary technical skills,
gathering and organizing the team is not an easy task.
Key-points:
•Finding the right team members•Finding the right team members
•Finding the most suited organizational
structure
•Integrating with the current structure
•Maintaining the health of the team
•Continuous improvement
RedTeam members specs
Knowledge set:
Operating Systems
Networking and Protocols
Firewalls
DatabasesDatabases
Scripting
Programming
Forensics
Characteristics:
Good communication
Curiosity
Willing to learn and share knowledge
Interact with the team and the clients
RedTeam members
Specific backgrounds:
•Network administrator (multiple OSes and infrastructure equipments)
•Developer(multiple languages, depending on the organization’s profile)
•Quality Assurance (software)
•System Architect / Implementer / Consultant (hardware & software)
General organization structures
Organization structures according to PMBOK
Executive/CISO
Executive/CISO
RedTeam
manager
PenTest expert Pentest expert
Functional
Matrix
RedTeam
project
coordinator
PenTest expert
Pentest expert
Projectized
Specific structure
To meet performance criteria for a RedTeam, a specific organization structure is needed.
CISO
Roles
CISO – Team Champion, provides business interface and long term
goals
RedTeam Manager – Technical Rockstar, oversees and works on all
RedTeam
Director
Project
Coordinator
PenTest
Expert
Pentest
Expert
Pentest
Expert
RedTeam Manager – Technical Rockstar, oversees and works on all
projects, distributes workload, translates business needs into technical
details, establishes short and medium term goals
Project Coordinator – The Organizer, keeps track of everything
PenTest Experts – The Army, the very foundation of the security
department, champions, rockstars and organizers altogether,
exceptional individuals delivering security services
Penetration tester experts are highly trained individuals with huge
egos (a recognized leader of the team is in charge with making
everybody happy at the workplace and with each other)
Psychological aspects
Time for training and research (the experts need to train and to
research new subjects to stay at the top of the elite)
Creativity (get the experts out of the routine and let them come up
with ingenious ideas to solve problems faster and better)
Building a geographically distributed team (working in different
corners of the world can be beneficial to cover all clients, but the
sharing of knowledge is obstructed and internal fights can occur)
Sociological aspects
sharing of knowledge is obstructed and internal fights can occur)
Different remuneration for the same skill-set (while it’s impossible to
have the same remuneration for everybody, it’s a good idea to keep
them within the same ranges and at the top of the market rates to
keep the experts on your team)
PenTesting Process
Deliverables
RedTeam Exercise Reports
Penetration Testing Reports
Consultancy for fixing the identified vulnerabilitiesConsultancy for fixing the identified vulnerabilities
Training for development and networking teams
Whitepapers on best practices
InfoSec Metrics
Advisories for upper management based on all of the above
Internal vs. External RedTeam
Advantages Disadvantages
Internal RedTeam • Sensitive information never leaves the
company
• May be biased
• Need managementcompany
• Knowledge of the internal systems
• When not working on a project, the
RedTeam can provide other valuable
services
• Cheap
• Need management
External contractor • A fresh pair of eyes
• Expertise on exotic systems
• The company needs to expose
sensitive information to a 3rd party
• Need to understand the inner-
workings of the systems
• Expensive
Internal vs. External RedTeam
So, where is the break-even point in which an internal RedTeam is the best solution?
Small company
A smaller company can benefit from periodical penetration test
with clear scopes from an external contractor
Medium company
If the company broke the 100 machines limit, a serious options is
to hire a dedicated Penetration Tester and as the size of the
network and number of the applications grows to increase the
number of security experts and eventually create a RedTeam
Enterprise
For a large company, the internal RedTeam is a must and the ROI
is much better than using an external contractor
External contractors can be used periodically in conjunction with an internal RedTeam to
provide a black-box, unbiased, external view of critical systems
About the author
Dan Catalin VASILE is a security guy with more then 15 years in IT&C, out of
which 12 are related to security.
He’s been working with start-ups, small companies and industry giants,
gathering relevant experience from all of those.gathering relevant experience from all of those.
His main areas of interest are around application and network security.
He is also involved in local security chapters like OWASP and ISC2 as a
meeting organizer, host and presenter.
You can contact him at danvasile@pentest.ro
http://www.pentest.ro (personal blog)
About the presentation
This presentation is the deliverable of a larger research that the author did
over the years.
The paper is the result of the personal experience of the author.The paper is the result of the personal experience of the author.
- Working for various sized companies
- Working as a team member, coordinator, leader and director
- Seen and have been under different organizational schemes
Creating and managing a RedTeam is a difficult task. This presentation brings
some light on the issues an organization will face in setting up a Penetration
Testing Team.
Thank you
danvasile@pentest.ro
http://www.pentest.ro

More Related Content

PPTX
Red team Engagement
PDF
Red Team Framework
PPTX
Red team and blue team in ethical hacking
PPTX
Red Team Framework
PPTX
Pen Testing Explained
PDF
Introduction to red team operations
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
How MITRE ATT&CK helps security operations
Red team Engagement
Red Team Framework
Red team and blue team in ethical hacking
Red Team Framework
Pen Testing Explained
Introduction to red team operations
Adversary Emulation and Red Team Exercises - EDUCAUSE
How MITRE ATT&CK helps security operations

What's hot (20)

PDF
Cyber threat intelligence ppt
PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PDF
How to Hunt for Lateral Movement on Your Network
PDF
Global Cyber Threat Intelligence
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
Threat Hunting with Cyber Kill Chain
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
Red team vs Penetration Testing
PPTX
Deception technology for advanced detection
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PDF
Introduction to MITRE ATT&CK
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Cyber Kill Chain.pptx
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PPTX
Penetration testing reporting and methodology
PDF
Vulnerability Management
PDF
Penetration testing
PDF
Introduction to penetration testing
PPTX
Adversary Emulation using CALDERA
Cyber threat intelligence ppt
Threat-Based Adversary Emulation with MITRE ATT&CK
How to Hunt for Lateral Movement on Your Network
Global Cyber Threat Intelligence
An introduction to SOC (Security Operation Center)
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Threat Hunting with Cyber Kill Chain
Threat Intelligence 101 - Steve Lodin - Submitted
Red team vs Penetration Testing
Deception technology for advanced detection
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Introduction to MITRE ATT&CK
Bsides 2019 - Intelligent Threat Hunting
Cyber Kill Chain.pptx
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
Penetration testing reporting and methodology
Vulnerability Management
Penetration testing
Introduction to penetration testing
Adversary Emulation using CALDERA
Ad

Viewers also liked (10)

PPTX
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
PPTX
PTES: PenTest Execution Standard
PDF
Purple teaming Cyber Kill Chain
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PPTX
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
PPTX
Introduction to Penetration Testing
PDF
How to Be Awesome on Slideshare
PDF
The Essentials of PowerPoint Color Theme
PDF
Security Incident Response Readiness Survey
PDF
Cybersecurity: Mock Cyberwar Game
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
PTES: PenTest Execution Standard
Purple teaming Cyber Kill Chain
State of the Internet: Mirai, IOT and History of Botnets
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Introduction to Penetration Testing
How to Be Awesome on Slideshare
The Essentials of PowerPoint Color Theme
Security Incident Response Readiness Survey
Cybersecurity: Mock Cyberwar Game
Ad

Similar to Building an InfoSec RedTeam (20)

PPTX
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
PDF
Deploying a data centric approach to enterprise agility
PDF
No more security empires - The ciso as an individual contributor
PPTX
Top learnings from evaluating and implementing a DLP Solution
PPT
It Sales Presentation 2010 03 31
PPTX
Module 1 - IDP.pptx
PDF
Building digital product masters to prevail in the age of accelerations parts...
PDF
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
PPTX
Patternbuilders Founder Showcase Deck
PPTX
Devops for business : Efficiency & Innovation
PDF
Intranets on Microsoft SharePoint
PDF
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
PPT
Isms4
PDF
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
PPT
Intranet governance - dull but necessary
PDF
Multisoft@Corporate Presentation
PDF
Multisoft@Corporate Presentation
PDF
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
PPT
Project report on cctv
PPTX
vCISO Overview Virtual CISO Chief Information Security Officer
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
Deploying a data centric approach to enterprise agility
No more security empires - The ciso as an individual contributor
Top learnings from evaluating and implementing a DLP Solution
It Sales Presentation 2010 03 31
Module 1 - IDP.pptx
Building digital product masters to prevail in the age of accelerations parts...
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
Patternbuilders Founder Showcase Deck
Devops for business : Efficiency & Innovation
Intranets on Microsoft SharePoint
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
Isms4
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
Intranet governance - dull but necessary
Multisoft@Corporate Presentation
Multisoft@Corporate Presentation
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Project report on cctv
vCISO Overview Virtual CISO Chief Information Security Officer

More from Dan Vasile (6)

PPTX
Dan Vasile - Risk Calculation and Visualization
PPTX
SC Congress Amsterdam 2016 - IoT Security
PPTX
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
PPTX
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
PPTX
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
PDF
Bug bounty programs
Dan Vasile - Risk Calculation and Visualization
SC Congress Amsterdam 2016 - IoT Security
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Bug bounty programs

Recently uploaded (20)

PPTX
operations management : demand supply ch
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
IFRS Notes in your pocket for study all the time
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
How to Get Funding for Your Trucking Business
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
Technical Architecture - Chainsys dataZap
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
operations management : demand supply ch
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
IFRS Notes in your pocket for study all the time
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Slide gioi thieu VietinBank Quy 2 - 2025
NEW - FEES STRUCTURES (01-july-2024).pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Solaris Resources Presentation - Corporate August 2025.pdf
How to Get Funding for Your Trucking Business
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
1911 Gold Corporate Presentation Aug 2025.pdf
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Technical Architecture - Chainsys dataZap
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Lecture 3344;;,,(,(((((((((((((((((((((((
Ôn tập tiếng anh trong kinh doanh nâng cao
Negotiation and Persuasion Skills: A Shrewd Person's Perspective

Building an InfoSec RedTeam

  • 1. InfoSec RedTeam Building and maintaining a Penetration Testing Team as the driving force of the Security Organizational Structure
  • 2. First Page :Why RedTeam? To rescue MONEY& REPUTATION
  • 3. First Page :How? By keeping HACKERS away!
  • 4. Second Page :Definitions RedTeam Independent group that challenges an organization to improve its security. Penetration TestPenetration Test Method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. Security Operations Center Centralized unit in an organization that deals with security issues, on an organizational and technical level.
  • 5. RedTeam – center of security RedTeam members are cutting-edge technical experts in a multitude of IT domains and are used as consultants by other services within the security department. Alongside with consultancy they also provide: -Training - Mentoring - Guidance - Best practices
  • 6. Functional relationships The RedTeam provides expert knowledge and share information with all departments across the Security Department. Just to name a few:
  • 7. Organizing a RedTeam Given the sensitive information the team is handling and the necessary technical skills, gathering and organizing the team is not an easy task. Key-points: •Finding the right team members•Finding the right team members •Finding the most suited organizational structure •Integrating with the current structure •Maintaining the health of the team •Continuous improvement
  • 8. RedTeam members specs Knowledge set: Operating Systems Networking and Protocols Firewalls DatabasesDatabases Scripting Programming Forensics Characteristics: Good communication Curiosity Willing to learn and share knowledge Interact with the team and the clients
  • 9. RedTeam members Specific backgrounds: •Network administrator (multiple OSes and infrastructure equipments) •Developer(multiple languages, depending on the organization’s profile) •Quality Assurance (software) •System Architect / Implementer / Consultant (hardware & software)
  • 10. General organization structures Organization structures according to PMBOK Executive/CISO Executive/CISO RedTeam manager PenTest expert Pentest expert Functional Matrix RedTeam project coordinator PenTest expert Pentest expert Projectized
  • 11. Specific structure To meet performance criteria for a RedTeam, a specific organization structure is needed. CISO Roles CISO – Team Champion, provides business interface and long term goals RedTeam Manager – Technical Rockstar, oversees and works on all RedTeam Director Project Coordinator PenTest Expert Pentest Expert Pentest Expert RedTeam Manager – Technical Rockstar, oversees and works on all projects, distributes workload, translates business needs into technical details, establishes short and medium term goals Project Coordinator – The Organizer, keeps track of everything PenTest Experts – The Army, the very foundation of the security department, champions, rockstars and organizers altogether, exceptional individuals delivering security services
  • 12. Penetration tester experts are highly trained individuals with huge egos (a recognized leader of the team is in charge with making everybody happy at the workplace and with each other) Psychological aspects Time for training and research (the experts need to train and to research new subjects to stay at the top of the elite) Creativity (get the experts out of the routine and let them come up with ingenious ideas to solve problems faster and better)
  • 13. Building a geographically distributed team (working in different corners of the world can be beneficial to cover all clients, but the sharing of knowledge is obstructed and internal fights can occur) Sociological aspects sharing of knowledge is obstructed and internal fights can occur) Different remuneration for the same skill-set (while it’s impossible to have the same remuneration for everybody, it’s a good idea to keep them within the same ranges and at the top of the market rates to keep the experts on your team)
  • 15. Deliverables RedTeam Exercise Reports Penetration Testing Reports Consultancy for fixing the identified vulnerabilitiesConsultancy for fixing the identified vulnerabilities Training for development and networking teams Whitepapers on best practices InfoSec Metrics Advisories for upper management based on all of the above
  • 16. Internal vs. External RedTeam Advantages Disadvantages Internal RedTeam • Sensitive information never leaves the company • May be biased • Need managementcompany • Knowledge of the internal systems • When not working on a project, the RedTeam can provide other valuable services • Cheap • Need management External contractor • A fresh pair of eyes • Expertise on exotic systems • The company needs to expose sensitive information to a 3rd party • Need to understand the inner- workings of the systems • Expensive
  • 17. Internal vs. External RedTeam So, where is the break-even point in which an internal RedTeam is the best solution? Small company A smaller company can benefit from periodical penetration test with clear scopes from an external contractor Medium company If the company broke the 100 machines limit, a serious options is to hire a dedicated Penetration Tester and as the size of the network and number of the applications grows to increase the number of security experts and eventually create a RedTeam Enterprise For a large company, the internal RedTeam is a must and the ROI is much better than using an external contractor External contractors can be used periodically in conjunction with an internal RedTeam to provide a black-box, unbiased, external view of critical systems
  • 18. About the author Dan Catalin VASILE is a security guy with more then 15 years in IT&C, out of which 12 are related to security. He’s been working with start-ups, small companies and industry giants, gathering relevant experience from all of those.gathering relevant experience from all of those. His main areas of interest are around application and network security. He is also involved in local security chapters like OWASP and ISC2 as a meeting organizer, host and presenter. You can contact him at danvasile@pentest.ro http://www.pentest.ro (personal blog)
  • 19. About the presentation This presentation is the deliverable of a larger research that the author did over the years. The paper is the result of the personal experience of the author.The paper is the result of the personal experience of the author. - Working for various sized companies - Working as a team member, coordinator, leader and director - Seen and have been under different organizational schemes Creating and managing a RedTeam is a difficult task. This presentation brings some light on the issues an organization will face in setting up a Penetration Testing Team.