Full-Scope, Multi-Layered Attack Simulation

Red Teaming is an exercise conducted to test the effectiveness of protection controls and detection controls and to measure the quality of response through active attack simulation across the physical, electronic, and social realms.

Red Team Testing

Red Team Testing exposes your weakest links, so you can strengthen them before attackers do. We mimic real-world attack methods across your systems – digital, physical, and human. Uncover blind spots and improve defenses across every level.

Red Team Development

Don't just test – build a powerful internal defense with Lares Red Team Development. We guide you step-by-step to create your own Red Team, tailored to your goals. Get continuous security improvement and real-time threat insights.

Red Team Training

Upskill your team to combat advanced threats. Lares Red Team Training delivers expert knowledge across cyber, physical, and social attack methods. Trusted by Fortune 500 companies and government agencies, this training boosts your in-house security expertise.

Customized Security Simulations

Get the most out of Red Teaming with Lares. We tailor exercises to your exact risks and business needs. Every scenario yields actionable steps to improve your cybersecurity posture.

Comprehensive Threat Coverage

Prepare to defend against a full spectrum of threats. Our Red Teaming tests your resilience against cyberattacks, social engineering, and more. Build a defense as multi-faceted as today's attack landscape.

Strategic Insights for Leadership

Lares Red Teaming gives leaders the data to make smart cybersecurity decisions. See your defenses clearly – strengths, weaknesses, and where to invest for maximum impact.

Compliance and Risk Management

Protect your data, avoid costly fines, and strengthen your reputation. Lares Red Teaming helps you meet compliance standards and stay ahead of emerging threats.

Red Team Staffing

Finding top security talent is tough. Lares solves this. We tap into our deep network of vetted Red Team experts to get you staffed quickly. Options for full-time, part-time, and advisory support to fit your needs.

Uncover Weaknesses. Strengthen Defenses. Red Teaming puts your security to the test.

EXECUTIVE WHITE PAPER

The Executive Guide to Red Team Testing

This executive guide provides a comprehensive overview of Red Teaming, an invaluable practice for assessing and enhancing an organization's security posture. Red Teaming involves simulating real-world attacks across physical, electronic, and social realms to identify vulnerabilities and weaknesses. This guide covers the definition, benefits, elements, planning, execution, reporting, capability building, challenges, and benefits of Red Teaming. Executives can leverage this information to make informed decisions, strengthen security defenses, and promote a culture of continuous improvement within their organizations.

WHITE PAPER

The Lares Red Team Methodology

This methodology guide provides a comprehensive overview of how Lares conducts Red Team engagements by simulating real-world attacks across physical, electronic, and social realms to identify vulnerabilities and weaknesses. This guide covers intelligence gathering, phone conversations, onsite visits, electronic solicitation, wireless testing, penetration testing, physical security testing, infrastructure footprinting, email address gathering, document and sensitive data discovery, individual profiling, and reporting.

Who you will be working with:

Senior Adversarial Engineer

Raúl Redondo

Senior Adversarial Engineer

Aidan Mitchell

Principal Adversarial Engineer

Dave Storie

Senior Adversarial Engineer

Neil Lines

Principal Adversarial Engineer

Chris Pritchard

North America Adversarial Engineering Lead

Brendan Hohenadel

Senior Adversarial Engineer

Steve Spence

Senior Adversarial Engineer

Raúl Redondo

Raúl is a specialist in offensive security with more than 7 years of experience. While he has experience in various fields, such as web and mobile audits, social engineering campaigns and cloud pentests (AWS, Azure, GCP), he has specialized in red/purple team projects, being passionate about Windows and Active Directory. Raúl holds several certifications, including Xintra’s Attacking and Defending Azure and M365, CRTO, OSCP, OSWE, OSEP, OSWP, among others. He also serves as an associate professor in Master’s Degree in Cybersecurity and Information Security from Castilla-La Mancha University. He consistently aims to add extra value to projects by thinking outside the box. Raúl enjoys spending time with his family, practicing sports, playing video games, watching movies, and hiking.

Senior Adversarial Engineer

Aidan Mitchell

Aidan has worked across both offensive and defensive security disciplines for almost a decade. This included several years in the fintech space, exposed to the rapidly changing world of DevOps, containerisation, and cloud security. His focus in recent years has been on developing effective tradecraft for targeting cloud- and SaaS-native enterprises. He works to a mantra of building before you break, spending considerable time developing, implementing, and deploying the technologies used by the industry to guarantee an intimate familiarity with the problems that clients face.

Principal Adversarial Engineer

Dave Storie

Dave got his start in IT working as a Systems Administrator learning to deploy, manage and maintain enterprise networks before pivoting to offensive security. Dave has performed a variety of security testing throughout his career with the majority of his security career focused on conducting full scale Red Team operations. He holds OSCP and OSCE certifications and has spoken at BSides Toronto and multiple student groups in the Greater Toronto Area about working in Information Security.

Senior Adversarial Engineer

Neil Lines

Neil Lines is an offensive security, red team specialist, with over ten years’ experience in performing internal, external infrastructure, web application, social engineering, and red team engagements. Before specializing in security Neil worked for over four years in IT engineering roles including desktop, networking support and design. Neil regularly performs guest lectures on penetration testing and has spoken at many security conferences. Over the years Neil has collected over nine industry recognized IT certifications from the likes of CREST, Tigerscheme, EC-Council and Cisco.

Principal Adversarial Engineer

Chris Pritchard

Chris has worked in a range of industries, most notable of which are Critical National Infrastructure (CNI), and leading edge design and manufacturing (Dyson). Doing so has given Chris a very varied array of knowledge, from penetration testing robot vacuum cleaners, to designing and testing secure ICS/OT networks.

During Chris’ time at Dyson, he was involved in developing the global security team and performing internal penetration testing. Chris was also heavily involved with securing the design of Dyson’s current and future internet connected appliances, and corresponding smartphone applications. 

Chris is an Adversarial Engineer (aka penetration tester) at Lares which involves him acting and thinking like a genuine attacker to compromise client networks. Chris’ skill set also includes Social Engineering, and he has successfully gained access into CNI, Airports and Casinos, which are regarded as some of the most secure facilities in the industry.

Chris has been lucky enough to have spoken at DefCon twice, and many different BSides’ across the country.

North America Adversarial Engineering Lead

Brendan Hohenadel

Brendan got his beginning in desktop support before moving over to security, first as defense before switching sides for offensive security. His current focus is malware development and payload delivery, as well as scouring enterprise networks for vulnerabilities, misconfigurations, and loot. Brendan has a bachelor’s degree in Computer Science and CISSP, OSCP, and OSCE certifications. He has presented at DefCon416, BsidesTO, and has participated in C3X. In his spare time, Brendan enjoys practicing a variety of martial arts, reading comic books, playing video games, and gardening.

Senior Adversarial Engineer

Steve Spence

Steve is an experienced adversarial security engineer and penetration testing team leader. Having worked across multiple high-profile sectors such as, GOV, Defence, FinTech, Banking, Medical and Health Insurance, resulted in accumulating over 15+ years of security experience, spanning physical security breaches, cyber security and social engineering.

Steve regularly helps develop and deliver targeted penetration testing, scenario-based engagements, while working alongside ‘in-house’ security teams to help mature their security posture. Steve has also attained/held a number of industry recognized security certifications from the likes of ITIL, CompTIA, SANS, Tiger Scheme and GCHQ.

In addition to his day-to-day responsibilities, Steve has volunteered at well-known security conferences, such as 44Con, BSides and SteelCon in order to give back to the security community.

LABS BLOG: Top 5 Insider Threat Findings

Lares encounters seemingly endless vulnerabilities when we conduct red team engagements, regardless of organization size or maturity. Though not every engagement is identical, we have analyzed the similarities between hundreds of engagements. The following insider threat findings report represents the most frequently observed throughout 2022.

LABS BLOG: This one time on a pentest... Is life just a CTF?!

Explore Lares' innovative penetration testing series, where we delve into fascinating real-world attack paths and techniques, showcasing how we navigate and secure diverse environments

LABS BLOG: Insider Threats vs Red Teaming

This post clarifies the distinctions between insider threat assessments and red team engagements, highlighting differences in initial access, duration, and resources, while emphasizing their shared goal of evaluating your organization's ability to detect and respond to skilled adversaries.

Some of our Delighted Customers

"The expertise and professionalism that Lares' Purple Team brings to the table are unmatched. We will definitely be bringing them back for future engagements."
Benjamin Vaughn
SVP & CISO, Hyatt
"They wanted to see us succeed as much as we wanted to see us succeed. This is why, 10 years later, we are still having this conversation."
Jeffrey Hecht
(Former) Chief Compliance & Security Officer, The Word & Brown Companies
"The biggest benefit of having a Lares vCISO is getting guidance on how to tackle security issues and determining a realistic approach on how to address them."
Andrew Casceillo
Corporate Director of Technical Services, Ulbrich Stainless Steel and Speciality Metals Inc.

CASE STUDY: Word & Brown

Using a culture of security as a baseline, Word & Brown achieved compliance because of its security journey — not in spite of it.

Looking for something else?

Empowering Organizations to Maximize Their Security Potential.

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing, and coaching since 2008.

15+ Years

In business

600+

Customers worldwide

4,500+

Engagements

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.