The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed.
Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used.
This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services:
• Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs.
• Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams.
• Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.