The cost of data breaches due to
malicious or criminal cyber attacks in 2014



per minute



Don't Be a Statistic

If your organization was breached, what would that mean for you? Loss of Reputation Regulatory Fines Financial Loss Service Disruption

The answer is likely similar to the majority of organizations that have not considered all the variables an outside attack could yield. In fact, few have mapped their assets and processes to identify what the potential financial, operational and privacy impacts could be.

Penetration Testing

Many organizations are not properly testing real-time detection and response capabilities against sophisticated outside attacks. Managing as well as executing attack simulations is not something most organizations are experts at.


of corporate IT systems could be penetrated by hackers within fifteen minutes

What is Red Team Penetration Testing?

A Red Team Penetration Test is a hybrid test designed to help clients get more out of their pentesting efforts. This is done by adding a blue team element as well as conducting a “macro” pentest.  “Macro” assessments evaluate and find vulnerabilities in every layer of your security.   The blue team exercise is when our testers work with your blue team or security operations center to refine and enhance detection capabilities. This provides real insight into what a real life hacker attack looks like and is therefore perfect for enhancing your defenses against an APT or advanced persistent threat.   Upgrade Your Penetration Testing Today!

Who requires it?

Numerous environments require penetration testing on an ongoing basis. Environments ranging from DoD affiliated agencies to companies that must maintain PCI, NIST, SOX, or HIPAA compliance, etc… Penetration testing (not just vulnerability scans) helps ensure applicable controls (scope, segmentation and methodologies, for example) are properly implemented and functioning.

Why is it required?

Advanced Persistent Threats are not mitigated by simply installing standard security software and hardware such as firewalls and antivirus. Cyber security professionals identify your threats then implement safeguards to protect against them.


Of all computers in the USA are infected with malware of some kind, at any given moment.

“The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeros, little bits of data… There’s a war out there… and it’s not about who’s got the most bullets. It’s about who controls the information.”

(Federation of American Scientists – Intelligence Resource Program)


Of all breaches are undiscovered for an average of 8 months


Where can you find our work?

Industries PeopleSec operatives have contracted in:

  • Gaming
  • Healthcare (Including Top 20 Hospitals)
  • High Finance (Top 5 & as well as to many other top 100)
  • Fortune 100
  • DoD Contractors
  • Law Firms (Top 100)
  • Charitable Organizations
  • National sporting teams

What can we do better than the bad guys?

Major accomplishments of PeopleSec operatives during prior engagements:

    • Perfect record  at achieving remote access as well as gaining domain administrator access
    • Socially engineer access to bank vaults
    • Socially engineer physical access to the money cage at multiple casinos
    • Picked locks at a Top Secret facility in under 10 seconds
    • Bypassed almost every network security control in the industry
    • Accessed the central operations center during a major sporting event and gaining control of the jumbotron screen

What are PeopleSec’s areas of expertise?

Our specializations include: