Red Team VS Blue Team: What’s The Difference? | PurpleSec
Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue teams are defensive security professionals responsible for maintaining internal network defenses against all cyber attacks and threats. Red teams simulate attacks against blue teams to test the effectiveness of the network’s security. These red and blue team exercises provide a holistic security solution ensuring strong defenses while keeping in view evolving threats.
Video Chapters
------------------------------
00:00 - Introduction
00:30 - What Is A Red Team?
01:02 - How Does A Red Team Work?
03:06 - The Tiger Team
03:25 - Examples Of Red Team Exercises
04:54 - What Is A Blue Team?
05:17 - How Does A Blue Team Work?
07:26 - Examples Of Blue Team Exercises
08:58 - What Are The Benefits Of Red And Blue Teams?
09:44 - How Do Red And Blue Teams Work Together?
11:08 - What Is A Purple Team?
About The Author
------------------------------
Jason Firch, MBA
https://purplesec.us/cyber-security-experts/jason-firch/
Resources & Links
------------------------------
What Is Cyber Security?
https://purplesec.us/cyber-security/
50 Free Information & Cyber Security Policy Templates
https://purplesec.us/resources/cyber-security-policy-templates/
What Is A Red Team?
A red team consists of security professionals who act as adversaries to overcome cyber security controls. Red teams often consist of independent ethical hackers who evaluate system security in an objective manner.
They utilize all the available techniques (discussed below) to find weaknesses in people, processes, and technology to gain unauthorized access to assets. As a result of these simulated attacks, red teams make recommendations and plans on how to strengthen an organization’s security posture.
What Is A Blue Team?
A blue team consists of security professionals who have an inside out view of the organization. Their task is to protect the organization’s critical assets against any kind of threat.
They are well aware of the business objectives and the organization’s security strategy. Therefore, their task is to strengthen the castle walls so no intruder can compromise the defenses.
What Is A Purple Team?
A purple team isn’t necessarily a stand alone team, although it could be. The goal of a purple team is to bring both red and blue teams together while encouraging them to work as a team to share insights and create a strong feedback loop.
Management should ensure that the red and blue teams work together and keep each other informed. Enhanced cooperation between both teams through proper resource sharing, reporting and knowledge share is essential for the continual improvement of the security program.
► If you need help securing your business from cyber attacks then feel free to check out: https://purplesec.us
► Follow us on Twitter: https://twitter.com/Purple_Sec
► Find us on Pinterest: https://www.pinterest.com/purple_sec/
#cybersecurity #PurpleSec #infosec
Видео Red Team VS Blue Team: What’s The Difference? | PurpleSec канала PurpleSec Cyber Security
Video Chapters
------------------------------
00:00 - Introduction
00:30 - What Is A Red Team?
01:02 - How Does A Red Team Work?
03:06 - The Tiger Team
03:25 - Examples Of Red Team Exercises
04:54 - What Is A Blue Team?
05:17 - How Does A Blue Team Work?
07:26 - Examples Of Blue Team Exercises
08:58 - What Are The Benefits Of Red And Blue Teams?
09:44 - How Do Red And Blue Teams Work Together?
11:08 - What Is A Purple Team?
About The Author
------------------------------
Jason Firch, MBA
https://purplesec.us/cyber-security-experts/jason-firch/
Resources & Links
------------------------------
What Is Cyber Security?
https://purplesec.us/cyber-security/
50 Free Information & Cyber Security Policy Templates
https://purplesec.us/resources/cyber-security-policy-templates/
What Is A Red Team?
A red team consists of security professionals who act as adversaries to overcome cyber security controls. Red teams often consist of independent ethical hackers who evaluate system security in an objective manner.
They utilize all the available techniques (discussed below) to find weaknesses in people, processes, and technology to gain unauthorized access to assets. As a result of these simulated attacks, red teams make recommendations and plans on how to strengthen an organization’s security posture.
What Is A Blue Team?
A blue team consists of security professionals who have an inside out view of the organization. Their task is to protect the organization’s critical assets against any kind of threat.
They are well aware of the business objectives and the organization’s security strategy. Therefore, their task is to strengthen the castle walls so no intruder can compromise the defenses.
What Is A Purple Team?
A purple team isn’t necessarily a stand alone team, although it could be. The goal of a purple team is to bring both red and blue teams together while encouraging them to work as a team to share insights and create a strong feedback loop.
Management should ensure that the red and blue teams work together and keep each other informed. Enhanced cooperation between both teams through proper resource sharing, reporting and knowledge share is essential for the continual improvement of the security program.
► If you need help securing your business from cyber attacks then feel free to check out: https://purplesec.us
► Follow us on Twitter: https://twitter.com/Purple_Sec
► Find us on Pinterest: https://www.pinterest.com/purple_sec/
#cybersecurity #PurpleSec #infosec
Видео Red Team VS Blue Team: What’s The Difference? | PurpleSec канала PurpleSec Cyber Security
Показать
Комментарии отсутствуют
Информация о видео
24 сентября 2020 г. 8:24:58
00:12:16
Другие видео канала
Building Your Purple Team - Enterprise Security Weekly #92Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSecPOP3 vs IMAP - What's the difference?Red Team vs. Blue Team vs. Purple TeamRSAC 2019 - PenTest vs. RedTeam - Different or the Same? What is Purple Teaming?7 Data Loss Prevention Best Practices & Strategies | PurpleSecRed Team and Blue Team Operations in Cyber Security explained in depth with real life examplesCyber Kumite - Ep. 1 - Pen Test vs. Red Teams vs. Purple TeamsWhat is The Difference Between VPN and Proxy ? | VPN vs Proxy | NAllamothu Sridhar | TV5 Tech AlertHow Often Should You Perform A Network Vulnerability Scan? | PurpleSecRed team, blue team, purple team: What's the difference? | Cyber Work PodcastCyber Security Fundamentals: What is a Blue team?Threat Hunting via Sysmon - SANS Blue Team SummitIoT Security: The Ugly Truth, Mike Muller CTO, ARMCommon Types Of Network Security Vulnerabilities In 2020 | PurpleSecWhat are certificates?Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | #BreachReportWhat Are The Types Of Penetration Testing? | PurpleSecBasic concepts of web applications, how they work and the HTTP protocolWhat is a Blue Team?