Purple Teaming
Adversarial Detection & Countermeasures, also known as Purple Team, engagements are designed to evaluate the effectiveness of the Information Security program, with a focus on detection, deflection, and deterrence.
Enhance your cybersecurity with our Purple Team
TrustedSec utilizes both Red Team (penetration testers) and Blue Team (defenders) consultants. The Red Team follows the Penetration Testing Execution Standard (PTES) to circumvent security controls and gain unauthorized access to systems. The Blue Team will then work with an organization’s defensive team to determine their ability to either detect the attack, deflect the attack, and/or deter the attacker.
With TrustedSec, you can:
With their years of experience, TrustedSec’s Incident Response team is able to provide a unique insight into attacks and assist in creating Incident Response Playbooks. This process includes:
- Improve your team’s organizational readiness
- Gauge current performance levels
- Improve training for defenders
- Increase end-user Information Security awareness
- Evaluate the effectiveness of your IT security defenses and controls
- Gain objective insight into vulnerabilities that may exist across your environment
Detection: Defined as the ability to recognize and identify an attack through multiple phases of a compromise, detection is the foundational element of reducing the damage inflicted during a breach. Detection systems include security information and event management (SIEM), network access control (NAC) rogue device detection, account change monitoring, suspicious command usage, user behavior analytics (UBA), and more. Where detection controls cannot be implemented, enhancements in deflection and deterrence controls are necessary.
Deflection: Also referred to as protection, deflection is the ability to build proactive measures that directly defend the network. This would include anti-virus, intrusion detection/prevention systems, NACs, and more. Where deflection controls cannot be implemented, enhancements to detection and deterrence controls are necessary.
Deterrence: The third piece of an organization’s defensive team is deterrence, which is the implementation of patch management procedures and the enforcement of complex password policies. This also includes creating paths of least resistance to bait an attacker to use a specific system or set of credentials in order to detect their activity, which is often achieved with Honeypots, Honeytokens, and Honeycreds. Where deterrence controls cannot be implemented, enhancements in detection and deflection controls are necessary.

“Our collaborative culture and reputation has attracted the most passionate, highly skilled professionals in the industry. It's incredible to see that the work we are doing is changing the industry.”Larry SpohnPractice Lead, Force

Larry Spohn
Practice Lead, ForceLarry Spohn is a highly experienced security consultant with over 20 years of experience in the industry and a proven track record of success in assessing and improving the security posture of organizations of all sizes. Larry is not only a skilled technical analyst with a deep understanding of security threats and vulnerabilities, but he is also an excellent communicator and trainer who is adept at conveying complex security concepts to both technical and non-technical audiences.
Get real security guidance from real security experts.
Experts across security domains are ready to tackle your security challenges.

Read our blog
Explore the latest cybersecurity topics on the TrustedSec Security Blog