<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Penetration Testing and Ethical Hacking in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37059#M24</link>
    <description>&lt;P&gt;&lt;EM&gt;Thanks!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jul 2020 14:16:40 GMT</pubDate>
    <dc:creator>EdSkinner1</dc:creator>
    <dc:date>2020-07-08T14:16:40Z</dc:date>
    <item>
      <title>Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/36924#M21</link>
      <description>&lt;P&gt;Good Morning,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are reviewing our organization's information security posture, and we have a few questions that we would like to pose to the group:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) What activities does your organization engage in for the areas of penetration testing and/or ethical hacking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Which of these activities do you consider valuable (and would recommend), and what key risks are associated with implementing them?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Are there other activities in these areas that you hope to implement in the future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We appreciate any feedback (if your feedback is too sensitive for posting, we'd be happy to email or setup a call, etc.).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Ed&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 13:02:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/36924#M21</guid>
      <dc:creator>EdSkinner1</dc:creator>
      <dc:date>2020-07-02T13:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/36947#M22</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1190179283"&gt;@EdSkinner1&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Try this consolidated link via OWASP and OSSTMM, NIST-800-115 etc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies" target="_blank"&gt;https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This should give you a good grounding and a baseline to determine what you want from Ethical Penetration Testing services and for contractual purposes and measurement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 23:38:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/36947#M22</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-07-02T23:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37020#M23</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1190179283"&gt;@EdSkinner1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My former employer did a lot of research on and use of phishing attacks. My core advice on using phishing attacks as part of your EH set is to make sure it is set up as a training experience for the employees, and not a gotcha jump on them.&lt;/P&gt;&lt;P&gt;Also, make darn sure you pay special attention to targeting your whales.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 14:58:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37020#M23</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-07-07T14:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37059#M24</link>
      <description>&lt;P&gt;&lt;EM&gt;Thanks!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 14:16:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37059#M24</guid>
      <dc:creator>EdSkinner1</dc:creator>
      <dc:date>2020-07-08T14:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37060#M25</link>
      <description>Thanks!</description>
      <pubDate>Wed, 08 Jul 2020 14:17:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/37060#M25</guid>
      <dc:creator>EdSkinner1</dc:creator>
      <dc:date>2020-07-08T14:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Penetration Testing and Ethical Hacking</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/75046#M1233</link>
      <description>Good Morning Ed,&lt;BR /&gt;&lt;BR /&gt;Thanks for reaching out! Here are my responses to the questions from a beginner’s perspective:&lt;BR /&gt;&lt;BR /&gt;1) In our organization, we do some basic penetration testing, like checking if our systems are secure from outside threats. We also test our web applications to see if there are any vulnerabilities that could be exploited. We’re just starting to explore ethical hacking practices to see where we can improve our security.&lt;BR /&gt;&lt;BR /&gt;2) I think these activities are really helpful because they allow us to spot weaknesses before anyone else does. One risk is that if the testing isn’t planned well, it could affect our systems. Also, handling the sensitive results of these tests requires caution to ensure they don’t fall into the wrong hands.&lt;BR /&gt;&lt;BR /&gt;3) Looking forward, we’d like to add more automated tools to regularly check our systems and keep our defenses up-to-date as new threats come up.&lt;BR /&gt;&lt;BR /&gt;Let me know if I can provide more information.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Kaisar Ahmed</description>
      <pubDate>Sun, 10 Nov 2024 14:21:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Penetration-Testing-and-Ethical-Hacking/m-p/75046#M1233</guid>
      <dc:creator>Kaisar_Ahmed</dc:creator>
      <dc:date>2024-11-10T14:21:58Z</dc:date>
    </item>
  </channel>
</rss>

