Red Team SIG


Traditional security methodologies have largely been focused on prevention, aimed at eliminating vulnerabilities and thereby mitigating security breaches before they happen. Security prevention strategies and technologies are important but cannot guarantee safety from every attack. Given today’s dynamic threat landscape, it is vital to acknowledge that a breach has either already occurred or that it’s only a matter of time until it will. Red Team exercises deliver end-to-end breach simulations that provide, as realistically as possible, security incidents that prepare those involved with dealing with actual breaches. The Red Team SIG shall provide a forum for Red Team members or leaders in order to discuss state of the art Red Teaming technologies, processes and methodologies.


We have the following goals: