MANAGED SECURITY SERVICES
Penetration Testing as a Service
Leveraging regular and focused penetration testing exercises, Breadcrumb provides your team with actionable feedback throughout the year.
------ SERVICE OVERVIEW
Traditional Penetration Testing is often described as an “annual event”, with testing exercises lasting multiple weeks to several months. While outcomes are valuable, they can be overwhelming, making remediation and prioritization efforts challenging. In worst-case scenarios, organizations end up with more questions than answers, and no clear direction forward.
Breadcrumb’s Penetration Testing as a Service (PTaaS) tackles this challenge by offering on-going and regular micro-testing. Each calendar quarter, Breadcrumb will focus on one testing strategy, ensuring the scope is manageable and focused. The result? Your team gets actionable and pragmatic results – all within budget.
"Ransomware attacks against will increase 500% by 2021." - Cybersecurity Ventures
Benefits
- Affordable and scalable
- Immediately actionable recommendations
- Employee and technical staff stay vigilant
- Collaborative testing strategies
- Custom scheduling options
- Enhanced staff cybersecurity awareness training
Features
- Custom vector selection
- Real-world breach scenario exposure
- Expert recommendations
- Blue team collaboration
- Physical assessment options
- Third-party impersonation
How it Works
Each calendar quarter, Breadcrumb engineers will strategically select one attack vector for exploitation. (note: the selection of the vector may be left to the discretion of Breadcrumb, or chosen in collaboration with your organization)
Breadcrumb conducts the testing (unannounced) within the calendar quarter, keeping your staff and technical team on their toes.
At the end of the quarter, Breadcrumb vCISO(s) meet with your team, reviewing the results, and offering practical and actionable advice on enhanced prevention and detection strategies.
Typical Penetration Testing Strategies
-
Business Email Compromise
-
Custom Malware Development
-
Data Interference, Metadata Harvesting
-
Help Desk Impersonation
-
Lool-alike Domain
-
Physical Walk-Ins
-
Social Engineering
-
Spoofed Phone Calls
-
Vendor Impersonation
-
WiFi Manipulation
Deliverables
- Quarterly & focused penetration testing
- Custom penetration testing strategies, specific to your organization
- Collaborative and co-development of strategy selection
- Strategic and expert recommendations on security posture improvement