We work with you to understand your requirements and the potential threat vectors (methods of entry) and threat actors (who is likely to attack you). We also define a scope around what is permitted and what isn't.
By adopting an adversarial approach towards the client, we leave no stone unturned in our attempts to compromise them as if we were a highly motivated attacker.
We not only use the full spectrum of digital security techniques - from Penetration Testing to Open Source Intelligence which are available to us - but also deploy our intelligence experts and move into the physical realm.
We use social engineering techniques to convince staff into helping us, as well as try to physically access the premises to test the security.
The moral courage of staff is also tested as we tailgate through doors and behave increasingly suspiciously until we are challenged. As you can imagine, Red Teaming brings with it some risks for us. In the event that we should get caught, we will require a "Get Out Of Jail Free" card, or a point of contact who is senior enough to calm a situation.