{"id":44,"date":"2024-01-08T11:11:22","date_gmt":"2024-01-08T10:11:22","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=44"},"modified":"2024-11-27T11:59:09","modified_gmt":"2024-11-27T10:59:09","slug":"red-teaming","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/","title":{"rendered":"Red Teaming"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-5878a3f1fd92e417f0dddfab36c617b9\"><strong>Red Teaming<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color has-large-font-size wp-elements-e1d31034e9e24460691dd8e037056098\" style=\"font-style:normal;font-weight:600\">Does your company recognise and survive a real cyber attack?<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start Red Teaming<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized wp-duotone-unset-1\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/02\/laokoon-red-teaming.svg\" alt=\"Red Teaming\" class=\"wp-image-1490\" style=\"width:520px\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-horizontal is-layout-flex wp-container-core-group-is-layout-c21e46d5 wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h2 class=\"wp-block-heading\">Red Teaming<\/h2>\n\n\n\n<p>Confidence to act in an emergency! That is the aim of a Red Teaming. We act like real attackers and attack your company. Without compromise. <\/p>\n\n\n\n<p>Red Teamings are aimed at the fulfilment of a previously defined task. This can be, for example\u00a0<strong>Leakage of certain company secrets<\/strong>\u00a0or the\u00a0<strong>Paralysing<\/strong>\u00a0a certain\u00a0<strong>Business Unit<\/strong>\u00a0be.<\/p>\n\n\n\n<p>The focus is therefore not necessarily on uncovering all technical vulnerabilities in the company. It is much more important to analyse the processes that are set in motion when an attack is detected. Are the measures effective? Are the defenders in a position to take the right measures?<\/p>\n\n\n\n<p>In our view, the results of such a measure are most efficient if everything has already been done in advance to optimally protect your IT organisation. Red teaming therefore forms a complementary building block.<\/p>\n\n\n\n<p>Essentially, it's about teaching you and your team what a real attack looks like and\u00a0<strong>Your team<\/strong>\u00a0so to\u00a0<strong>empower<\/strong>this\u00a0<strong>Attack<\/strong>\u00a0in the best possible way\u00a0<strong>exist<\/strong>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">What is the difference between penetration testing and red teaming?<\/h3>\n\n\n\n<p>A <a href=\"https:\/\/laokoon-security.com\/en\/service\/penetration-tests\/\" data-type=\"page\" data-id=\"20\">Penetrationtest<\/a>also known as a pen test, is a check of the security of computer systems in order to uncover as many vulnerabilities and security gaps as possible in the systems and applications tested.<\/p>\n\n\n\n<p>In contrast, red teaming refers to the simulation of attacks by a hostile or threatening scenario to test a company or organisation's capabilities and procedures in dealing with threats.<\/p>\n\n\n\n<p>In general, red teaming is a more comprehensive approach that also considers the human component of attacks and defences, while penetration testing focuses mainly on technical vulnerabilities.<\/p>\n\n\n\n<p><strong>Important to know:\u00a0<\/strong>The defence team (blue team) is not involved in the planning and preparation of red teaming, in contrast to the implementation of a penetration test. An essential part of red teaming is analysing if and when an attack is detected and how the processes work after detection.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">How does Red Teaming work?<\/h2>\n\n\n\n<p>A Red Teaming campaign generally consists of several phases, including<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5e060ef wp-block-group-is-layout-flex\" style=\"margin-top:60px;margin-bottom:30px\">\n<div class=\"wp-block-group line-holder wp-container-content-b3829bdc is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"timline-line\"><\/div>\n\n\n\n<div class=\"timline-line-base\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group wp-container-content-68ac353a is-layout-flex wp-container-core-group-is-layout-4255f73a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">1. <strong>Pre-engagement activities<\/strong><\/h6>\n\n\n\n<p>In this phase, the goals and objectives of the red teaming are defined, a team is put together and a plan for the implementation of the campaign is drawn up. We start with an in-depth analysis of your organisation to define clear objectives and focus areas for the red teaming assessment. This enables us to understand your specific requirements and security objectives.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">2. <strong>Intelligence Gathering<\/strong><\/h6>\n\n\n\n<p>By identifying potential targets and gathering information about your organisation, we obtain a comprehensive picture of your infrastructure, employees and network topologies.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">3. threat modelling<\/h6>\n\n\n\n<p>Based on the information collected, we develop realistic attack scenarios to test the security situation of your organisation. Our focus is on identifying vulnerabilities that could be of interest to potential attackers.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">4. <strong><strong>Weak point analysis<\/strong><\/strong><\/h6>\n\n\n\n<p>By actively searching, we identify vulnerabilities in your infrastructure, applications and physical security measures.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">5. <strong><strong><strong>Exploitation<\/strong><\/strong><\/strong><\/h6>\n\n\n\n<p>We simulate attacks to test the identification and exploitation of vulnerabilities. We use realistic methods and techniques to simulate the approach of a real attacker.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">6. <strong><strong><strong>Post-exploitation<\/strong><\/strong><\/strong><\/h6>\n\n\n\n<p>We review the extension of access rights to assess the effectiveness of your internal security measures.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">7. <strong><strong><strong><strong>Reporting and debriefing<\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<p>We collect data to evaluate the success of the attacks and identify vulnerabilities that may not be immediately obvious. Once the tests are complete, we create a comprehensive report with the identified vulnerabilities, successful attack scenarios and specific recommendations for security improvements.<\/p>\n\n\n\n<p>We will sit down with you to discuss the results, answer questions and explain our recommendations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p>The phases can differ in their characteristics depending on the use case and customer.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group wp-container-content-958eb9dc is-horizontal is-layout-flex wp-container-core-group-is-layout-c21e46d5 wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">Continuous Red Teaming<\/h3>\n\n\n\n<p>The implementation of continuous red teaming is recommended. In consultation with the commissioning organisation, different focal points can be set regularly in order to gain a comprehensive picture of safety and processes.<\/p>\n\n\n\n<p>Focal points can be:<\/p>\n\n\n\n<ul style=\"margin-top:10px;margin-bottom:20px\" class=\"wp-block-list checklist\">\n<li>Human factor (e.g. spear phishing, vishing)<\/li>\n\n\n\n<li>Open information gathering (OSINT, darknet research, password leaks)<\/li>\n\n\n\n<li>Perimeter security<\/li>\n\n\n\n<li>Technical safety<\/li>\n\n\n\n<li>Intrusion Detection<\/li>\n<\/ul>\n\n\n\n<p>As a rule, the commissioning organisation releases a budget for a period in which the red teaming is carried out. This means that the client does not know exactly when the attacks will take place. This allows a more realistic picture to be drawn.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-2 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-d4feb432716d08dba11db8bba0448af3\">When does Red Teaming make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-b572b089c76ae44ba68c8691d5c2ac07\">\n<li>Your company already relies on an established IT security infrastructure.<\/li>\n\n\n\n<li>You employ a blue team or personnel who are primarily concerned with the defence of the systems.<\/li>\n\n\n\n<li>They are exposed to particular threats, for example from aggressive competitors or as a state actor.<\/li>\n\n\n\n<li>You have high expectations of your IT security and don't just want to rely on theory and concepts, you want to get a realistic picture.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start Red Teaming now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1444\" data-uid=\"69dc3d54c2bc1\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1444\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1444\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69dc3d54c2bc1\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><label class=\"forminator-label\">Attack is the best defence!<\/label><h4 class=\"has-base-color\">Hire Red Teaming now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc3d54c2bc1-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc3d54c2bc1-label\" class=\"forminator-label\">What types of attack simulations should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69dc3d54c2bc1-label\" for=\"forminator-field-checkbox-1-1-69dc3d54c2bc1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Red Teaming\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"redteaming\" id=\"forminator-field-checkbox-1-1-69dc3d54c2bc1\" aria-labelledby=\"forminator-field-checkbox-1-1-69dc3d54c2bc1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Red Teaming<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69dc3d54c2bc1-label\" for=\"forminator-field-checkbox-1-2-69dc3d54c2bc1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Assume Breach\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"assumebreach\" id=\"forminator-field-checkbox-1-2-69dc3d54c2bc1\" aria-labelledby=\"forminator-field-checkbox-1-2-69dc3d54c2bc1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Assume Breach<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69dc3d54c2bc1-label\" for=\"forminator-field-checkbox-1-3-69dc3d54c2bc1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Sensory test\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"sensoriktest\" id=\"forminator-field-checkbox-1-3-69dc3d54c2bc1\" aria-labelledby=\"forminator-field-checkbox-1-3-69dc3d54c2bc1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Sensory test<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69dc3d54c2bc1-label\" for=\"forminator-field-checkbox-1-4-69dc3d54c2bc1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"CASMART\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"CASMART\" id=\"forminator-field-checkbox-1-4-69dc3d54c2bc1\" aria-labelledby=\"forminator-field-checkbox-1-4-69dc3d54c2bc1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">CASMART<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1444__field--select-1_69dc3d54c2bc1\" id=\"forminator-form-1444__field--select-1_69dc3d54c2bc1-label\" class=\"forminator-label\">Have penetration tests and other types of attack simulations already been carried out in the past?<\/label><select  id=\"forminator-form-1444__field--select-1_69dc3d54c2bc1\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1444__field--select-1_69dc3d54c2bc1-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"date-1\" class=\"forminator-field-date forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-date-1-picker_69dc3d54c2bc1\" id=\"forminator-field-date-1-picker_69dc3d54c2bc1-label\" class=\"forminator-label\">What is the best time to start implementation?<\/label><div class=\"forminator-input-with-icon\"><span class=\"forminator-icon-calendar\" aria-hidden=\"true\"><\/span><input autocomplete=\"off\" type=\"text\" size=\"1\" name=\"date-1\" value=\"\" placeholder=\"Select date\" id=\"forminator-field-date-1-picker_69dc3d54c2bc1\" class=\"forminator-input forminator-datepicker\" data-required=\"\" data-format=\"mm\/dd\/yy\" data-restrict-type=\"\" data-restrict=\"\" data-start-year=\"1926\" data-end-year=\"2126\" data-past-dates=\"enable\" data-start-of-week=\"1\" data-start-date=\"\" data-end-date=\"\" data-start-field=\"\" data-end-field=\"\" data-start-offset=\"\" data-end-offset=\"\" data-disable-date=\"\" data-disable-range=\"\" \/><\/div><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69dc3d54c2bc1\" id=\"forminator-field-name-1_69dc3d54c2bc1-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69dc3d54c2bc1\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69dc3d54c2bc1\" id=\"forminator-field-email-1_69dc3d54c2bc1-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69dc3d54c2bc1\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69dc3d54c2bc1\" id=\"forminator-field-phone-1_69dc3d54c2bc1-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69dc3d54c2bc1\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69dc3d54c2bc1\" id=\"forminator-field-textarea-1_69dc3d54c2bc1-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69dc3d54c2bc1\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69dc3d54c2bc1\" id=\"forminator-field-consent-1_69dc3d54c2bc1-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69dc3d54c2bc1__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69dc3d54c2bc1\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69dc3d54c2bc1-label\" aria-describedby=\"forminator-field-consent-1_69dc3d54c2bc1__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69dc3d54c2bc1__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"4b0d2fbcff\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/44\" \/><input type=\"hidden\" name=\"form_id\" value=\"1444\"><input type=\"hidden\" name=\"page_id\" value=\"44\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1327.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Red Teaming Erkennt und \u00fcbersteht Ihr Unternehmen einen echten Cyberangriff? Red Teaming Handlungssicherheit im Ernstfall! Das ist das Ziel eines Red Teamings. Wir agieren wie echte Angreifer und greifen Ihr Unternehmen an. Ohne Kompromisse. Red Teamings zielen auf die Erf\u00fcllung eines zuvor festgelegten Auftrags ab. Dieser kann zum Beispiel das\u00a0Ausschleusen bestimmter Firmengeheimnisse\u00a0oder die\u00a0Lahmlegung\u00a0einer bestimmten\u00a0Business Unit\u00a0sein. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1490,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-44","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":3823,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/44\/revisions\/3823"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/1490"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}