{"id":40,"date":"2024-01-08T11:10:24","date_gmt":"2024-01-08T10:10:24","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=40"},"modified":"2024-11-29T12:06:54","modified_gmt":"2024-11-29T11:06:54","slug":"attack-simulation","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/attack-simulation\/","title":{"rendered":"Attack simulation"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-5fff77b6c37ad07a69192184d512ada8\"><strong>Attack Simulations<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-bb3f46eb8c9db55e7fbb2b3f91cbb9fd\" style=\"font-style:normal;font-weight:600\">Train as you fight!<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure attack simulation<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-attack-simulations.svg\" alt=\"Attack simulation\" class=\"wp-image-181\" style=\"width:520px\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b4aebb85 wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:100px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:70px;margin-bottom:70px\">\n<h2 class=\"wp-block-heading\">All theory is grey: are you prepared for a real attack?<\/h2>\n\n\n\n<p>Unlike a penetration test, the focus of our attack simulations is not exclusively on technical measures, but primarily on the processes for incident and emergency management as well as detection (attack recognition, analysis of sensor technology) and response. <\/p>\n\n\n\n<p>Of course, security vulnerabilities are also sought and, if necessary, exploited. However, the focus is on how the IT organisation deals with extreme situations and attacks.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group wp-container-content-958eb9dc is-horizontal is-layout-flex wp-container-core-group-is-layout-9eeb8ddb wp-block-group-is-layout-flex\" style=\"margin-top:70px;margin-bottom:70px\">\n<h2 class=\"wp-block-heading\">We distinguish between Red Teaming and Assumed Breach Simulations in our attack simulations.<\/h2>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">Red Teaming<\/h3>\n\n\n\n<p>Red teamings do not necessarily uncover all technical weaknesses in the company, but are aimed at fulfilling a previously defined mission. This can be, for example, the leaking of certain company secrets or the paralysis of a specific business unit.<\/p>\n\n\n\n<p>From our point of view, such a measure is most efficient if everything has already been done in advance to optimally protect your IT organisation. Red teaming is therefore a complementary building block. It is essentially about teaching you and your team what a real attack looks like and enabling your team to withstand this attack in the best possible way.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">Assume Breach<\/h3>\n\n\n\n<p>In our Assume Breach procedure, we simulate the misbehaviour of employees or the exploitation of an existing vulnerability in the external infrastructure. We act like an attacker who gains initial access to the company systems through a phishing mail or a vulnerability and then spreads further.<\/p>\n\n\n\n<p>This allows us to analyse how the defence mechanisms in place detect the attack and react to stop it. Do the procedures work and are effective immediate measures taken? We'll find out!<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-71d00c2f7697e3ac51eb35381195a1ce\">When does an attack simulation make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-fb0063a3496c9d95339b3d8cc1dc3347\">\n<li>You have laid the theoretical foundations.<\/li>\n\n\n\n<li>You want to know how a real cyberattack will affect your systems. <\/li>\n\n\n\n<li>You want to find out whether your defence mechanisms are effective.<\/li>\n\n\n\n<li>You want to see if you can recognise attacks before it's too late.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start AttackSimulation now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-content-justification-center is-layout-flex wp-container-core-group-is-layout-18151a08 wp-block-group-is-layout-flex\" style=\"margin-top:150px;margin-bottom:150px;padding-right:15px;padding-left:15px\">\n<h2 class=\"wp-block-heading has-text-align-center wp-container-content-958eb9dc\">Our attack simulations<\/h2>\n\n\n\n<div style=\"margin-top:0px;margin-bottom:0px;height:100px;width:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-ae35ab75\"><\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/laokoon-red-teaming.svg\" alt=\"\" class=\"wp-image-1490\" style=\"width:328px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-c813314ed9932c37e447cad6f548fbd7\">Red Teaming<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-979a52dbe1395805cb98fb717bedfb24\" style=\"font-style:normal;font-weight:600\">Does your company recognise and survive a real cyber attack?<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-fd9e1c28ec24f17c7d4c8cd605c75795\">Confidence to act in an emergency! That is the aim of a Red Teaming. We act like real attackers and attack your company. Without compromise.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-spezialisten-trainings.svg\" alt=\"\" class=\"wp-image-548\" style=\"width:328px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-8180cf5a7122d966572e8f92123e06f1\">Assume Breach<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-e60ac64b9f22c8cd07999fab37154d46\" style=\"font-style:normal;font-weight:600\">Are you confident when the attackers are already in the network?<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-97b703b5e6028c680da2ffee625862d5\">Whether internal attacks, zero-day exploits or phishing attacks: there are many ways for attackers to penetrate the internal network. Do your security mechanisms recognise lateral movement and are you able to act appropriately?<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/assume-breach\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/laokoon-CSMART-.svg\" alt=\"\" class=\"wp-image-1250\" style=\"width:328px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-aaa852649a8b493c97d8bf551bca5d1f\">CASMART<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-c47880d39bbb9ef5c9ed398f98fdd0e6\" style=\"font-style:normal;font-weight:600\">Continuous Attack Surface Monitoring and Red Teaming<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-cb10af051c778b8ffe3185d8d7301478\">A clear picture of the current threat situation, coupled with targeted red teaming operations - that's what CASMART offers. With a regular contingent of deployment days and continuous monitoring of the threat situation, you are one step ahead of attackers!<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/casmart\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-sensoriktest.svg\" alt=\"\" class=\"wp-image-491\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-d7825e198b05414b9c0b44fb74a08b18\">Sensory test<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-81379ac3484249fd61fb3aa5c818266f\" style=\"font-style:normal;font-weight:600\">Does your SOC deliver what it promises?<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-17728cb6879b1109ed1a385df32638fe\">A sensory test offers you the opportunity to check and specifically improve the effectiveness and efficiency of your safety systems and processes. <\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/sensory-test\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><p><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1444\" data-uid=\"69e90e50ce4f8\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1444\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1444\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69e90e50ce4f8\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><label class=\"forminator-label\">Attack is the best defence!<\/label><h4 class=\"has-base-color\">Order Attack Simulation now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69e90e50ce4f8-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69e90e50ce4f8-label\" class=\"forminator-label\">What types of attack simulations should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69e90e50ce4f8-label\" for=\"forminator-field-checkbox-1-1-69e90e50ce4f8\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Red Teaming\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"redteaming\" id=\"forminator-field-checkbox-1-1-69e90e50ce4f8\" aria-labelledby=\"forminator-field-checkbox-1-1-69e90e50ce4f8-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Red Teaming<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69e90e50ce4f8-label\" for=\"forminator-field-checkbox-1-2-69e90e50ce4f8\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Assume Breach\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"assumebreach\" id=\"forminator-field-checkbox-1-2-69e90e50ce4f8\" aria-labelledby=\"forminator-field-checkbox-1-2-69e90e50ce4f8-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Assume Breach<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69e90e50ce4f8-label\" for=\"forminator-field-checkbox-1-3-69e90e50ce4f8\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Sensory test\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"sensoriktest\" id=\"forminator-field-checkbox-1-3-69e90e50ce4f8\" aria-labelledby=\"forminator-field-checkbox-1-3-69e90e50ce4f8-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Sensory test<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69e90e50ce4f8-label\" for=\"forminator-field-checkbox-1-4-69e90e50ce4f8\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"CASMART\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"CASMART\" id=\"forminator-field-checkbox-1-4-69e90e50ce4f8\" aria-labelledby=\"forminator-field-checkbox-1-4-69e90e50ce4f8-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">CASMART<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1444__field--select-1_69e90e50ce4f8\" id=\"forminator-form-1444__field--select-1_69e90e50ce4f8-label\" class=\"forminator-label\">Have penetration tests and other types of attack simulations already been carried out in the past?<\/label><select  id=\"forminator-form-1444__field--select-1_69e90e50ce4f8\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1444__field--select-1_69e90e50ce4f8-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"date-1\" class=\"forminator-field-date forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-date-1-picker_69e90e50ce4f8\" id=\"forminator-field-date-1-picker_69e90e50ce4f8-label\" class=\"forminator-label\">What is the best time to start implementation?<\/label><div class=\"forminator-input-with-icon\"><span class=\"forminator-icon-calendar\" aria-hidden=\"true\"><\/span><input autocomplete=\"off\" type=\"text\" size=\"1\" name=\"date-1\" value=\"\" placeholder=\"Select date\" id=\"forminator-field-date-1-picker_69e90e50ce4f8\" class=\"forminator-input forminator-datepicker\" data-required=\"\" data-format=\"mm\/dd\/yy\" data-restrict-type=\"\" data-restrict=\"\" data-start-year=\"1926\" data-end-year=\"2126\" data-past-dates=\"enable\" data-start-of-week=\"1\" data-start-date=\"\" data-end-date=\"\" data-start-field=\"\" data-end-field=\"\" data-start-offset=\"\" data-end-offset=\"\" data-disable-date=\"\" data-disable-range=\"\" \/><\/div><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69e90e50ce4f8\" id=\"forminator-field-name-1_69e90e50ce4f8-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69e90e50ce4f8\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69e90e50ce4f8\" id=\"forminator-field-email-1_69e90e50ce4f8-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69e90e50ce4f8\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69e90e50ce4f8\" id=\"forminator-field-phone-1_69e90e50ce4f8-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69e90e50ce4f8\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69e90e50ce4f8\" id=\"forminator-field-textarea-1_69e90e50ce4f8-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69e90e50ce4f8\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69e90e50ce4f8\" id=\"forminator-field-consent-1_69e90e50ce4f8-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69e90e50ce4f8__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69e90e50ce4f8\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69e90e50ce4f8-label\" aria-describedby=\"forminator-field-consent-1_69e90e50ce4f8__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69e90e50ce4f8__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"588684e939\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/40\" \/><input type=\"hidden\" name=\"form_id\" value=\"1444\"><input type=\"hidden\" name=\"page_id\" value=\"40\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/attack-simulation\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1327.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Attack Simulations Train as you fight! Grau ist alle Theorie: Sind Sie auf einen realen Angriff vorbereitet? Anders als bei einem Penetrationstest liegt der Fokus bei unseren Attack Simulations nicht ausschlie\u00dflich auf technischen Ma\u00dfnahmen, sondern prim\u00e4r auf den Prozessen zur Incident- und Notfallbew\u00e4ltigung sowie der Detektion (Angriffserkennung, Analyse der Sensorik) und Reaktion. Selbstverst\u00e4ndlich werden auch [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":181,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-40","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/40","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/40\/revisions"}],"predecessor-version":[{"id":3880,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/40\/revisions\/3880"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/181"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}