What EY can do for you
Attack and penetration assessments are aimed at demonstrating the actual risk that is caused by a cyber security breach and the extent of the security risk exposure to the organization.
EY conducts cybersecurity assessments using tactics, techniques, and procedures (TTPs) designed to emulate real-world cyber-attacks targeting critical business areas and high value assets.
Some examples of such TTPs are:
- Red team threat emulation assessments
- Purple team threat emulation assessments
- Technical security testing across Infrastructure (IT, SCADA, VOIP, etc.)
- Cloud security assessment
- Product security assessment
- Traditional attack and penetration assessments including internal, external, wireless, applications and mobile