Which tools are allowed (DDOS? Social Engineering? Physical access?)
Do you have cooperation from IT?
How is the data gathered handled? Who can see it? How are you covering tracks? NDA?
What is being tested?
IP address ranges allowed? (what about things like external websites if they sub contract out?)
Physical Locations, some? All? None?
Cloud?
Suggested Activities and Discussion Topics:
As you go about your Pen test of a company, you notice a massive breach for both customers and employees. You find significant data is out on Pastebin including SS# for a couple employees, do you stop the pen test to inform the company? Keep going because you know you'll find more and the good of many out weighs the few?
Should there be different rules for pen testing different areas? For example, should infrastructure like power grids and water treatment systems have specialized rules for who can perform the test and how pen testing works? What about health systems, and wearables? For example what about smart devices that mesure heart rate? Or sugar levels? Or period trackers?
Automated vulnerability testing, should researchers be allowed to do automated vulnerability testing? Does it make a difference if it's more or less invasive? What about when the system isn't reasonably security (small business, hospital, education etc)? What precautions should be taken to make this better?
CISO and personal risk, should CISOs (Chief Information Security Officers) take personal responsibility for companies that are breeched or hacked? As in, should a CISO go to jail for security negligence? Should they be fired if a breech/hack happens? How does corporate organizational deficiencies (Not following the outlined procedures, not documenting, not following best practices, etc) affect this?
Would you like to see some more classes?
Click here