red-goat.com Open in urlscan Pro
2a06:98c1:3121::3  Public Scan

Submitted URL: http://red-goat.com/
Effective URL: https://red-goat.com/
Submission: On September 14 via manual from IN — Scanned from NL

Form analysis 2 forms found in the DOM

GET /

<form class="search-form" method="get" action="/">
  <div class="container"> <input type="text" name="s" placeholder="Search..." class="search-input" autocomplete="off"> <button type="submit">Go</button></div>
</form>

POST /#wpcf7-f483-p6-o1

<form action="/#wpcf7-f483-p6-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;"> <input type="hidden" name="_wpcf7" value="483"> <input type="hidden" name="_wpcf7_version" value="5.8"> <input type="hidden" name="_wpcf7_locale" value="en_GB"> <input type="hidden" name="_wpcf7_unit_tag"
      value="wpcf7-f483-p6-o1"> <input type="hidden" name="_wpcf7_container_post" value="6"> <input type="hidden" name="_wpcf7_posted_data_hash" value=""> <input type="hidden" name="_wpcf7_recaptcha_response" value=""></div>
  <p><span class="wpcf7-form-control-wrap" data-name="Helpyouwith"><select class="wpcf7-form-control wpcf7-select" aria-invalid="false" name="Helpyouwith">
        <option value="What can we help you with">What can we help you with</option>
        <option value="Training/Webinars">Training/Webinars</option>
        <option value="Exercising">Exercising</option>
        <option value="Crisis Consultancy">Crisis Consultancy</option>
        <option value="Speaking at an Event">Speaking at an Event</option>
      </select></span></p>
  <p><span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Name" value="" type="text"
        name="your-name"></span></p>
  <p><span class="wpcf7-form-control-wrap" data-name="CompanyName"><input size="40" class="wpcf7-form-control wpcf7-text" aria-invalid="false" placeholder="Company Name" value="" type="text" name="CompanyName"></span></p>
  <p><span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" aria-required="true" aria-invalid="false"
        placeholder="Company Email Address" value="" type="email" name="your-email"></span></p>
  <p><span class="wpcf7-form-control-wrap" data-name="PhoneNumber"><input size="40" class="wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel" aria-invalid="false" placeholder="Phone Number" value="" type="tel" name="PhoneNumber"></span>
  </p>
  <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span></p> <span
    class="wpcf7-form-control-wrap recaptcha" data-name="recaptcha"><span data-sitekey="6LeEaZEUAAAAALHago8k4GrGea9ZJDfNwCdNeh9r" class="wpcf7-form-control wpcf7-recaptcha g-recaptcha">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LeEaZEUAAAAALHago8k4GrGea9ZJDfNwCdNeh9r&amp;co=aHR0cHM6Ly9yZWQtZ29hdC5jb206NDQz&amp;hl=en-GB&amp;v=uEf7E1417z6GNSkRx7AyL8K8&amp;size=normal&amp;cb=mysmlgsc5s75" width="304"
            height="78" role="presentation" name="a-yrf4hvwttjnb" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
        <textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </span> <noscript>
      <div class="grecaptcha-noscript"> <iframe src="https://www.google.com/recaptcha/api/fallback?k=6LeEaZEUAAAAALHago8k4GrGea9ZJDfNwCdNeh9r" frameborder="0" scrolling="no" width="310" height="430"> </iframe><textarea name="g-recaptcha-response"
          rows="3" cols="40" placeholder="reCaptcha Response Here">		</textarea></div>
    </noscript> </span>
  <div class="align-right">
    <p><button type="submit" class="wpcf7-submit button">Submit<div class="graphic"></div>
        <div class="arrow"></div>
      </button></p>
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="_wpcf7_ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="_wpcf7_ak_js" value="1694708077873">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
  <div class="wpcf7-response-output" aria-hidden="true"></div><input type="hidden" name="vx_width" value="1600"><input type="hidden" name="vx_height" value="1200"><input type="hidden" name="vx_url" value="https://red-goat.com/">
</form>

Text Content

We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or
content, and analyze our traffic. By clicking "Accept All", you consent to our
use of cookies.

Customize Reject All Accept All
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions.
You will find detailed information about all cookies under each consent category
below.

The cookies that are categorized as "Necessary" are stored on your browser as
they are essential for enabling the basic functionalities of the site. ... Show
more

NecessaryAlways Active

Necessary cookies are required to enable the basic features of this site, such
as providing secure log-in or adjusting your consent preferences. These cookies
do not store any personally identifiable data.

No cookies to display.

Functional

Functional cookies help perform certain functionalities like sharing the content
of the website on social media platforms, collecting feedback, and other
third-party features.

No cookies to display.

Analytics

Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics such as the number of
visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance

Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

No cookies to display.

Advertisement

Advertisement cookies are used to provide visitors with customized
advertisements based on the pages you visited previously and to analyze the
effectiveness of the ad campaigns.

No cookies to display.

Accept All Save My Preferences Reject All
Powered by
 * Training
   * Social Engineering Training Course
   * Crisis Management Training
   * Executive Briefings
   * Webinars
 * Cyber Crisis Exercise
 * Crisis Management Services
 * Insider Threat
 * About
 * Resources
   * Download The Complete Guide to Running a Cybersecurity Tabletop Exercise
   * Case Studies
   * Blog
   * Smishing
   * Vishing
   * Insider Threat
   * Insider Threat Report
 * Contact

Go


TRAINING, EXERCISING AND CONSULTANCY TO HELP DEFEND YOUR ORGANISATION AGAINST
CYBER THREATS




Get in touch




CYBER SECURITY TRAINING AND EXERCISING TO PROTECT YOUR COMPANY FROM CYBER
THREATS


JOIN THE THOUSANDS OF STUDENTS THAT HAVE ENJOYED OUR CYBER SECURITY TRAINING


CYBER SECURITY TRAINING

Improve your human defences to cyber threats. Increase understanding and
participation in cyber hygiene best practice through training that engages and
informs.

We provide bespoke, virtual and online atraining courses across a range of cyber
security topics including insider threats, social engineering, cyber hygiene and
the importance of reporting mistakes.

Start training today




CYBER EXERCISES

A realistic, scenario based cyber crisis exercise is the number one way to
improve your response to a cyber incident. Organisations that prepare and
practice for cyber incidents recover faster and significantly reduce the costs
of an incident.
Our exercises build the confidence and competence of your crisis management
team, put your plans and frameworks to the test and help your organisation
improve its resilience.

Learn more about cyber exercising




IMPROVE YOUR RESPONSE TO A POTENTIAL CYBER ATTACK


BUILDING YOUR CYBER CRISIS RESILIENCE IS A CRUCIAL PART OF DEFENDING YOUR
ORGANISATION


CRISIS MANAGEMENT SERVICES

Clearly written plans and frameworks are a key part of the incident planning
process. They need to be useable and the people responsible for orchestrating
the response must be well trained in using them. We provide a suite of crisis
management services to help you build lasting resilience as an organisation.

Learn more




INSIDER THREAT PROGRAM DEVELOPMENT AND TRAINING

Intentional insider threats are a growing problem. While mistakes are
responsible for the majority of incidents, intentional insider threats resulting
in theft of IP, fraud or sabotage are far more costly and can seriously impact
an organisation’s profitability and reputation. We provide a range of services
and training that helps you build an effective, supportive and employee led
insider threat program. In line with NIST guidelines, we have developed a simple
10 step process to benchmark and develop your insider threat program.

Learn more




DEFEND YOUR ORGANISATION AGAINST INTENTIONAL INSIDER THREATS


BUSINESSES WE’VE HELPED.

“I was hugely impressed by the Social Engineering Awareness Course run by Red
Goat Cyber Security. It is one of the first courses I’ve encountered where those
who attended it have continued to talk about it long afterwards; a sure sign
that the key messages imparted by the trainer have stuck. “

JOHN STANLEY MBCI, RISK & RESILIENCE MANAGER – UCAS

“I was delighted with how Red Goat Cyber Security delivered the cyber security
table top exercise.  We have learnt valuable lessons to further improve our
plans, processes and check lists and would highly recommend them to other
organisations”

SALISBURY NATIONAL HEALTH SERVICE TRUST

“Excellent course and great scenarios. We would recommend this course to anyone,
really informative and relaxed. Rarely is there a course that is both
informative and enjoyable. Really good.”

ROYAL UNITED HOSPITALS BATH

“Red Goat were able to provide informative and engaging courses on social
engineering that opened the eyes of many of our users to threats and malicious
patterns of behaviour. The courses were well organised, well delivered and
appealed to a wide array of colleagues of all ability levels.”

VERTASE FLI

“Red Goat Cyber Security continue to be an essential business partner to help us
deliver engaging, insightful and professional experiences for our people and
executive teams to teach them how to defend against cyber-attacks. Lisa, in
particular brings such an energy and experience on cyber crisis and insider
threats that really engages with the audience.”

PINSENT MASONS LLP

“Red Goat Cyber Security have created excellent, informative and interactive
Social Engineering Awareness training which is suitable for all levels of staff.
Lisa manages to get everyone excited about Information Security with her
authentic and engaging presentation style. We are proud to call Red Goat Cyber
Security one of our key security training providers.”

HISCOX INSURANCE

“Red Goat were really helpful in tailoring a course to our needs. The trainer
was really engaging.”

FUTURES HOUSING GROUP

“Red Goat were very helpful and provided an excellent training course that was
really engaging and helpful to a wide range of our staff”.

BRISTOL AIRPORT

“I was hugely impressed by the Social Engineering Awareness Course run by Red
Goat Cyber Security. It is one of the first courses I’ve encountered where those
who attended it have continued to talk about it long afterwards; a sure sign
that the key messages imparted by the trainer have stuck. “

JOHN STANLEY MBCI, RISK & RESILIENCE MANAGER – UCAS

“I was delighted with how Red Goat Cyber Security delivered the cyber security
table top exercise.  We have learnt valuable lessons to further improve our
plans, processes and check lists and would highly recommend them to other
organisations”

SALISBURY NATIONAL HEALTH SERVICE TRUST

“Excellent course and great scenarios. We would recommend this course to anyone,
really informative and relaxed. Rarely is there a course that is both
informative and enjoyable. Really good.”

ROYAL UNITED HOSPITALS BATH

“Red Goat were able to provide informative and engaging courses on social
engineering that opened the eyes of many of our users to threats and malicious
patterns of behaviour. The courses were well organised, well delivered and
appealed to a wide array of colleagues of all ability levels.”

VERTASE FLI

“Red Goat Cyber Security continue to be an essential business partner to help us
deliver engaging, insightful and professional experiences for our people and
executive teams to teach them how to defend against cyber-attacks. Lisa, in
particular brings such an energy and experience on cyber crisis and insider
threats that really engages with the audience.”

PINSENT MASONS LLP

“Red Goat Cyber Security have created excellent, informative and interactive
Social Engineering Awareness training which is suitable for all levels of staff.
Lisa manages to get everyone excited about Information Security with her
authentic and engaging presentation style. We are proud to call Red Goat Cyber
Security one of our key security training providers.”

HISCOX INSURANCE

“Red Goat were really helpful in tailoring a course to our needs. The trainer
was really engaging.”

FUTURES HOUSING GROUP

“Red Goat were very helpful and provided an excellent training course that was
really engaging and helpful to a wide range of our staff”.

BRISTOL AIRPORT

“I was hugely impressed by the Social Engineering Awareness Course run by Red
Goat Cyber Security. It is one of the first courses I’ve encountered where those
who attended it have continued to talk about it long afterwards; a sure sign
that the key messages imparted by the trainer have stuck. “

JOHN STANLEY MBCI, RISK & RESILIENCE MANAGER – UCAS

“I was delighted with how Red Goat Cyber Security delivered the cyber security
table top exercise.  We have learnt valuable lessons to further improve our
plans, processes and check lists and would highly recommend them to other
organisations”

SALISBURY NATIONAL HEALTH SERVICE TRUST

“Excellent course and great scenarios. We would recommend this course to anyone,
really informative and relaxed. Rarely is there a course that is both
informative and enjoyable. Really good.”

ROYAL UNITED HOSPITALS BATH




GET IN TOUCH TO DISCUSS HOW WE CAN HELP YOU ACHIEVE YOUR SECURITY AWARENESS OR
RESILIENCE GOALS.

By submitting your message and your phone number and/or email address, you are
permitting us to contact you by these means in response to your enquiry or
feedback. You also acknowledge that you have read our privacy terms and that you
consent to our processing data in accordance with them.
Read our privacy policy here.

What can we help you withTraining/WebinarsExercisingCrisis ConsultancySpeaking
at an Event














Submit



Δ




CYBER SECURITY ARTICLES

View all articles



LEAK OF THE WEEK: 711M EMAIL ADDRESSES

A French malware researcher has found an online database of 711 million email
addresses, in some cases with the associated passwords for that account. The
list […]

Read more



SOUTH KOREA 2 : TRUST, CYBER-SECURITY AND WANNACRY

In my first article on South Korea I looked at some unique solutions to
protecting citizens and businesses from the cyber threat. In this second article
on […]

Read more



SOUTH KOREA 1: ON THE ALERT

In the first of two blog articles on cyber security and tech in South Korea, I
am looking at the pervasive use of technology in […]

Read more



KEY RISK INDICATORS IN CYBER SECURITY

Understanding key risk indicators (KRIs) in cybersecurity In the constantly
evolving landscape of cybersecurity, key risk indicators (KRIs) play a crucial
role in measuring and […]

Read more



HOW TO WRITE AN EFFECTIVE RANSOMWARE PLAYBOOK

Ransomware playbooks contain detailed instructions on what to do in the event of
a ransomware attack. Read our guide to getting started with developing a
ransomware playbook for your organisation.

Read more



HOW TO GET EXEC APPROVAL FOR A CYBER EXERCISE

Testing your response to a cyber-attack will save you resources in the event of
a real incident, but for many organisations taking the first step in exercising
can seem like a big commitment in time and energy. Here are some top tips on
getting exec approval for a cyber exercise.

Read more



GET STARTED WITH CRISIS COMMUNICATION PLANNING

Cyber-attacks are no longer outlier events. In fact, the old saying of “it’s not
if – but when” has sadly proven true for many organisations. For this reason
many organisations are now heavily focused on planning and preparing for a
cyber-attack and increasing their levels of resilience, response and redundancy
to enable them to survive.

Read more



7 EXAMPLES OF CYBER TABLETOP EXERCISES

Would you know how to respond if your organisation was hit by a cyber attack?
Running a cyber tabletop exercise allows you to prepare and test responses in a
safe environment. But what type of cyber incident should you use in your
exercise? Here are seven examples of cyber tabletop exercises that you could
consider running for your crisis team.

Read more



A BIG CHANGE FOR FUTURE CYBER-ATTACK VICTIMS IN FRANCE?

A big change is coming in France. From April 24th this year cyber attack victims
will now have 72 hours…

Read more



MONERO AND THE RISE OF PRIVACY COINS IN RANSOM DEMANDS

Bitcoin has been synonymous with ransomware for as long as cybercriminals have
been encrypting hard drives. Now ransoms are increasingly being demanded in
alternative cryptocurrencies […]

Read more



PREPARING FOR A RANSOMWARE ATTACK: PAYMENT

Another year passes and we are still not seeing the significant dip in
ransomware and double extortion…

Read more



THE COMPLETE GUIDE TO RUNNING A CYBERSECURITY TABLETOP EXERCISE

What is a cybersecurity tabletop exercise? A tabletop exercise is an engaging
and realistic simulation of a cyber crisis situation. It tests human and
managerial […]

Read more



RANSOMWARE – NOT JUST FLYING SOUTH FOR THE WINTER.

In 2022 major ransomware groups have been looking for new profitable markets,
and their gaze has fallen…

Read more



CAN CRYPTOCURRENCY PLATFORMS CLAIM PAYING ATTACKERS IS A “WHITE HAT BOUNTY”?

Today I want to talk about bug bounties. You are probably sitting there thinking
you have heard every…

Read more



LISA FORTE – DARKNET DIARIES

One of our Partners, Lisa Forte, was asked to be a guest on what is perhaps the
most popular and influential…

Read more



LLOYD’S OF LONDON EXCLUDE NATION-BACKED CYBER ATTACKS FROM INSURANCE

Lloyds of London has announced that from 2023 all of its insurer groups will
have to exclude “catastrophic”…

Read more



OFAC SANCTIONS TORNADO CASH: WHAT THIS MEANS FOR RANSOMWARE PAYMENTS

In early August the U.S Treasury’s Office of Foreign Assets Control (OFAC)
sanctioned another popular…

Read more



LISA FORTE TALKS ABOUT TABLE-TOP EXERCISES ON MIMECAST’S PHISHY BUSINESS

Listen to the episode here: Listen on Spotify Episode Description: In this
episode of Phishy Business, we take a look at cyber crisis exercises and […]

Read more



THE VITALLY IMPORTANT ROLE OF LOGGISTS IN A CYBER INCIDENT

Who? Why? When your crisis management team (CMT) meet they are usually gathered
to handle a crisis. They have to operate in high pressure situations […]

Read more



AWS/CAPITAL ONE HACKER JAILED FOR MASSIVE DATA THEFT AND ILLICIT CRYPTO MINING

“She wanted data, she wanted money and she wanted to brag” This was what
Assistant United States Attorney Andrew Friedman said of Paige Thompson in […]

Read more



SUPPLY CHAIN SECURITY: RENAISSANCE OR RETROGRESSION?

Overall we have a low level of visibility and understanding of our supply
chains. Horizon scanning for threats and vulnerabilities needs to extend into
this […]

Read more



MAERSK INCIDENT RESPONSE

Updated April 2023 Fire drills are commonplace. We test the alarms, the
evacuation procedures and the fire marshals get to practice their roles. In a
[…]

Read more



ARE ALL INSIDER THREATS BAD APPLES?

The “bad apples” argument for insider threats is simply too reductionist. Here
is why: When an intentional insider threat manifests it is a product of […]

Read more



3 EASY TRAPS YOUR CRISIS MANAGEMENT TEAM COULD FALL INTO AND HOW TO PREVENT THEM

Your Crisis Management Team, CMT, helps prepare your organisation for an
incident and manages the strategic response to any incidents or crisis that
occurs. In […]

Read more



A NEW RANSOMWARE BUSINESS MODEL?

2020 and 2021 have seen some pretty epic ransoms being paid by companies that at
one point in time you would have assumed would never […]

Read more



REBUILDING AFTER A CYBER ATTACK

We talk a lot about handling the initial car crash of a breach. What to do
first, the comms that need to go out and […]

Read more



WOULD YOU FALL FOR A $35M VOICE CLONING ATTACK?

A high tech vishing attack utilising voice cloning has lost a UAE bank 35
Million USD. What happened? According to the court documents: the Victim […]

Read more



DEFCON TALK: USING SE TO CREATE INSIDER THREATS AND WIN ALL THE THINGS

  Lisa Forte’s Defcon 2021 talk on social engineering and insider threat.
Transcript to follow.

Read more



THE GOLD-SILVER-BRONZE COMMAND STRUCTURE

The Gold-Silver-Bronze or ‘GSB’ command structure was rooted in and developed
heavily by the UK emergency services. It was designed to establish a clear
hierarchical […]

Read more



INSIDER THEFT OF $119M WORTH OF COCA COLA IP

What happened? An engineer who worked for Coca Cola and other manufacturers is
alleged to have stolen valuable trade secrets in order to set up […]

Read more



TESLA INSIDER THREAT CASE (KHATILOV)

Tesla Insider Threat Case Study According to the official Filing, Tesla is suing
a former employee and software engineer named Alex Khatilov alleging trade
secret […]

Read more



WARGAMING, CYBER ATTACKS AND ASTRONAUT THINKING

CEO Digital Show This week Lisa was on the CEO Digital show
discussing Wargaming, Cyberattacks, Protecting Against Romance Fraud, &
‘Astronaut Thinking’ in Leadership. Key points […]

Read more



THE 5 BEST WAYS TO SPOT TV LICENCE PHISHING EMAILS

TV Licence Phishing Emails In the UK a licence is required to watch live TV in
the home. With lockdown continuing and people’s reliance on […]

Read more



WHAT IS VISHING?

What is vishing? How to How to defend your organisation against telephone-based
vishing scams

Read more



BEHAVIOUR CHANGE IN YOUR ORGANISATION (SHORT VIDEO)

Getting your staff to change their security behaviour It is often submitted that
fear is bad. Actually, from a behavioural science perspective we know fear […]

Read more



HACKED! RIGHT MATCH SINGLES SUFFERS A DATA BREACH..

Cyber Security Awareness Month Special: “Hacked” What would you do if your
company was hit by a cyber attack? Do you have a plan? A […]

Read more



GET STAFF ENGAGED FOR CYBERSECURITY AWARENESS MONTH

October is ECSM, a month-long European event promoting good cyber security
practices and safety. This years themes are: 1. Cyber First Aid:What to do in
[…]

Read more



CV19 AND KASPERSKY NEXT

At the Kaspersky NEXT event, Cyber Volunteers 19 (CV19) Co-founder and partner
at Red Goat Cyber Security, Lisa Forte discussed with Kaspersky’s

Read more



PRE-ELECTION TRICKS GOES DEEPER THAN SOCIAL MEDIA.

How pre-election manipulation goes deeper than social media. A critical moment
is almost upon us. It will be a test of the protections we’ve tried […]

Read more



INSIDER THREAT $800K ROGUE ADMIN

Rogue Admin: Disgruntled former IT admin Charles E. Taylor quit his job at an
unnamed Atlanta based distribution company before going on a sabotage spree
costing the company $800,000 USD to redress.

Read more



LISA FORTE ON SMASHING SECURITY PODCAST

178: Office pranks, meat dresses, and robocop dogs  May 14th, 2020  |   50 mins
42 secs  coronavirus, data breach, email storm, hacking, k2, lady gaga,
microsoft, […]

Read more



PERMISSIONS CREEP

Permissions Creep, also known as privilege creep, is what happens when an
employee moves between roles in an organisation and keeps the access or
permissions of the previous role.

Read more



SHOULD YOUR COMPANY BAN ZOOM?

As several businesses ditch the popular conferencing tool, Lisa Forte, partner
at Red Goat Cyber Security, calls for calm  Zoom, the free to use video
conferencing […]

Read more



CYBER VOLUNTEERS 19

Do you work in cyber security? Why not sign up to volunteer to help protect
healthcare providers during the Covid-19 pandemic.

Read more



LISA FORTE ON RANDOM BUT MEMORABLE PODCAST

Comically Bad Ultrasonic Berry with Lisa Forte Description Do we need more
positivity in cybersecurity? And are bananas a type of berry? Join us, as […]

Read more



WHY RUN A CYBER EXERCISE?

Your company could have the most detailed response plans in the world but if
they have not been tested they may well be useless when they are most needed. A
cyber security incident is not a good time for seeing if your plans actually
work.

Read more



INSIDER THREAT FRAUD: £4.6M IN SELF-SIGNED INVOICES

Of the three categories of insider threat; theft, fraud and sabotage, insider
threat fraud is often the most complex,  inventive and difficult to detect. This
[…]

Read more



LISA FORTE INTERVIEW WITH DIGIT MAGAZINE

LISA FORTE INTERVIEW WITH DIGIT MAGAZINE Lisa Forte, partner and cyber threat
specialist at Red Goat Cyber, shares her insights about the ‘insider threat’ and
[…]

Read more



AMAZON RING INSIDER THREAT

Ring, the Amazon owned home-security company, has admitted firing four employees
who accessed users’ videos. The employees had access to the video feeds but
exceeded their authorised access by viewing them. This has undoubtedly caused
embarrassment for Ring.

Read more



THE FACEBOOK INSIDER

Friday the 13th  is a day that has been long associated with bad omens. This
became a reality for almost 30,000 Facebook staff though on […]

Read more



TREND MICRO INSIDER BREACH

The Tokyo based cyber security company Trend Micro has revealed it has been the
victim of a sophisticated insider threat attack. Customer records were accessed
[…]

Read more



INSIDER THREAT: FORMER SEC INVESTIGATOR CHARGED

The SEC investigator was charged with several crimes including unauthorized
computer access and disclosure of confidential information. The defendant, Mr.
Cohn, was the MD and […]

Read more



HOW VOICE ASSISTANTS CAN BE USED TO PHISH PASSWORDS

We have seen a wealth of articles on the security and privacy issues around
voice assistants. This week I came across and new and far […]

Read more



RED GOAT INSIDER THREAT REPORT

Insider Threat Report 2019 finally released! Red Goat Cyber Security are proud
to announce the results of their research into insider threat reporting. The
research […]

Read more



3 STEPS TO MAKE CYBER SECURITY AWARENESS MONTH A SUCCESS

October is Cyber Security Awareness Month! A lot of our clients are busy
preparing events and internal campaigns to increase awareness of cyber related
issues […]

Read more



RED GOAT FINALISTS FOR COMPUTER SECURITY AWARDS 2019

Red Goat Cyber Security has been recognised as a finalist in the 2019 Computing
Security Awards. Partner and Co-founder, Lisa Forte, has been selected as […]

Read more



TEISS PODCAST ON INSIDER THREAT

“I really enjoyed making this podcast with Anna Delaney. She always asks hard
interesting questions and it was great fun to discuss some of the […]

Read more



TALES FROM THE ROAD: OSINT IN THE WASHROOM

I recently went for a meeting at a company’s office. This company had a few
floors in a shared office building. Due to a large […]

Read more



ONLINE RADICALISATION AND SOCIAL ENGINEERING

Online radicalisation and social engineering There has been a lot of media
coverage here in the UK about a young woman who previously left the […]

Read more



PARIS RIOTS, SOCIAL PROOF AND CORPORATE SECURITY

I was recently hired to speak at an event in Paris. I love the city however this
particular visit was during an unfortunate time. Paris […]

Read more



THE HUSTLERS OF NAPLES

Social engineering is a fascinating and diverse attack vector because it
exploits human nature and people are generally predictable in their responses.
We focus on […]

Read more



SIMONE – A SOCIAL MEDIA INVESTIGATION

Speaking around the world about social engineering one question comes up almost
every time. Why is social engineering so successful? A key success factor in […]

Read more



INTERVIEW WITH DIGIT

Social engineering and social media risks Here’s a link to an interview with
DIGIT who organise the excellent Scot-Secure event in Edinburgh (among many
other […]

Read more



RECONNAISSANCE FOR SOCIAL ENGINEERING: TALES FROM THE ROAD

Social engineering reconaissance When it comes to reconnaissance and open source
intelligence, research often seems like a digital battle. Using endless pieces
of software, sites […]

Read more



WEBINAR: THINK LIKE A HACKER

We recently did a webinar with APMG on why you need to think like a hacker. They
have uploaded it
here: https://apmg-international.com/events/why-you-need-start-thinking-hacker

Read more



CAN I BORROW YOUR SWIPECARD?

This case involves an accountancy firm based in South East England. The firm had
just lost a big client and as a result had to make some cuts which included
letting a few members of staff go.

Read more



STAY CALM AND (DON’T) PAY THE HACKERS

This social engineering case study highlights how attackers can use curiosity,
urgency and fear to manipulate victims into breaking company protocols and get a
finance employee to willingly transfer £152,000 into the attackers bank account.

Read more



THE ENTHUSIASTIC LAW STUDENT

This case involves a law firm based in the south of England. The firm was of a
reasonable size and, like most law firms, held a lot of very sensitive customer
data.

Read more



CRIMINAL JUSTICE EVOLUTION PODCAST

Patrick Fitzgibbons was kind enough to invite me on to his US based Criminal
Justice Evolution podcast.  We talked about the social engineering threats
facing […]

Read more



THE NOT-SO-SECRET LIFE OF BOARDING PASSES

Have you ever thought about what your boarding pass might say about you? I don’t
mean “oh look at me, I’m flying in Emirates Business Class”, but what data you
might be leaking publicly on that anachronistic piece of paper you discard in
the seat in front of you. Turns out it is an awful lot more than you think…

Read more



THE PRISONERS DILEMMA AND INTELLIGENCE SHARING

Cybercrime is increasing year on year. The 2017 cyber breaches survey shows that
almost half of UK firms have been hit by cyber breach or […]

Read more



EQUIFAX LEAK

In the latest in a truly blockbuster year for data leaks, American credit
reporting company Equifax has announced the loss of highly sensitive data
belonging […]

Read more



LEAK OF THE WEEK: 711M EMAIL ADDRESSES

A French malware researcher has found an online database of 711 million email
addresses, in some cases with the associated passwords for that account. The
list […]

Read more



SOUTH KOREA 2 : TRUST, CYBER-SECURITY AND WANNACRY

In my first article on South Korea I looked at some unique solutions to
protecting citizens and businesses from the cyber threat. In this second article
on […]

Read more



SOUTH KOREA 1: ON THE ALERT

In the first of two blog articles on cyber security and tech in South Korea, I
am looking at the pervasive use of technology in […]

Read more



KEY RISK INDICATORS IN CYBER SECURITY

Understanding key risk indicators (KRIs) in cybersecurity In the constantly
evolving landscape of cybersecurity, key risk indicators (KRIs) play a crucial
role in measuring and […]

Read more



HOW TO WRITE AN EFFECTIVE RANSOMWARE PLAYBOOK

Ransomware playbooks contain detailed instructions on what to do in the event of
a ransomware attack. Read our guide to getting started with developing a
ransomware playbook for your organisation.

Read more



HOW TO GET EXEC APPROVAL FOR A CYBER EXERCISE

Testing your response to a cyber-attack will save you resources in the event of
a real incident, but for many organisations taking the first step in exercising
can seem like a big commitment in time and energy. Here are some top tips on
getting exec approval for a cyber exercise.

Read more



GET STARTED WITH CRISIS COMMUNICATION PLANNING

Cyber-attacks are no longer outlier events. In fact, the old saying of “it’s not
if – but when” has sadly proven true for many organisations. For this reason
many organisations are now heavily focused on planning and preparing for a
cyber-attack and increasing their levels of resilience, response and redundancy
to enable them to survive.

Read more



7 EXAMPLES OF CYBER TABLETOP EXERCISES

Would you know how to respond if your organisation was hit by a cyber attack?
Running a cyber tabletop exercise allows you to prepare and test responses in a
safe environment. But what type of cyber incident should you use in your
exercise? Here are seven examples of cyber tabletop exercises that you could
consider running for your crisis team.

Read more



A BIG CHANGE FOR FUTURE CYBER-ATTACK VICTIMS IN FRANCE?

A big change is coming in France. From April 24th this year cyber attack victims
will now have 72 hours…

Read more



MONERO AND THE RISE OF PRIVACY COINS IN RANSOM DEMANDS

Bitcoin has been synonymous with ransomware for as long as cybercriminals have
been encrypting hard drives. Now ransoms are increasingly being demanded in
alternative cryptocurrencies […]

Read more



PREPARING FOR A RANSOMWARE ATTACK: PAYMENT

Another year passes and we are still not seeing the significant dip in
ransomware and double extortion…

Read more



THE COMPLETE GUIDE TO RUNNING A CYBERSECURITY TABLETOP EXERCISE

What is a cybersecurity tabletop exercise? A tabletop exercise is an engaging
and realistic simulation of a cyber crisis situation. It tests human and
managerial […]

Read more



RANSOMWARE – NOT JUST FLYING SOUTH FOR THE WINTER.

In 2022 major ransomware groups have been looking for new profitable markets,
and their gaze has fallen…

Read more



CAN CRYPTOCURRENCY PLATFORMS CLAIM PAYING ATTACKERS IS A “WHITE HAT BOUNTY”?

Today I want to talk about bug bounties. You are probably sitting there thinking
you have heard every…

Read more



LISA FORTE – DARKNET DIARIES

One of our Partners, Lisa Forte, was asked to be a guest on what is perhaps the
most popular and influential…

Read more



LLOYD’S OF LONDON EXCLUDE NATION-BACKED CYBER ATTACKS FROM INSURANCE

Lloyds of London has announced that from 2023 all of its insurer groups will
have to exclude “catastrophic”…

Read more



OFAC SANCTIONS TORNADO CASH: WHAT THIS MEANS FOR RANSOMWARE PAYMENTS

In early August the U.S Treasury’s Office of Foreign Assets Control (OFAC)
sanctioned another popular…

Read more



LISA FORTE TALKS ABOUT TABLE-TOP EXERCISES ON MIMECAST’S PHISHY BUSINESS

Listen to the episode here: Listen on Spotify Episode Description: In this
episode of Phishy Business, we take a look at cyber crisis exercises and […]

Read more



THE VITALLY IMPORTANT ROLE OF LOGGISTS IN A CYBER INCIDENT

Who? Why? When your crisis management team (CMT) meet they are usually gathered
to handle a crisis. They have to operate in high pressure situations […]

Read more



AWS/CAPITAL ONE HACKER JAILED FOR MASSIVE DATA THEFT AND ILLICIT CRYPTO MINING

“She wanted data, she wanted money and she wanted to brag” This was what
Assistant United States Attorney Andrew Friedman said of Paige Thompson in […]

Read more



SUPPLY CHAIN SECURITY: RENAISSANCE OR RETROGRESSION?

Overall we have a low level of visibility and understanding of our supply
chains. Horizon scanning for threats and vulnerabilities needs to extend into
this […]

Read more



MAERSK INCIDENT RESPONSE

Updated April 2023 Fire drills are commonplace. We test the alarms, the
evacuation procedures and the fire marshals get to practice their roles. In a
[…]

Read more



ARE ALL INSIDER THREATS BAD APPLES?

The “bad apples” argument for insider threats is simply too reductionist. Here
is why: When an intentional insider threat manifests it is a product of […]

Read more



3 EASY TRAPS YOUR CRISIS MANAGEMENT TEAM COULD FALL INTO AND HOW TO PREVENT THEM

Your Crisis Management Team, CMT, helps prepare your organisation for an
incident and manages the strategic response to any incidents or crisis that
occurs. In […]

Read more



A NEW RANSOMWARE BUSINESS MODEL?

2020 and 2021 have seen some pretty epic ransoms being paid by companies that at
one point in time you would have assumed would never […]

Read more



REBUILDING AFTER A CYBER ATTACK

We talk a lot about handling the initial car crash of a breach. What to do
first, the comms that need to go out and […]

Read more



WOULD YOU FALL FOR A $35M VOICE CLONING ATTACK?

A high tech vishing attack utilising voice cloning has lost a UAE bank 35
Million USD. What happened? According to the court documents: the Victim […]

Read more



DEFCON TALK: USING SE TO CREATE INSIDER THREATS AND WIN ALL THE THINGS

  Lisa Forte’s Defcon 2021 talk on social engineering and insider threat.
Transcript to follow.

Read more



THE GOLD-SILVER-BRONZE COMMAND STRUCTURE

The Gold-Silver-Bronze or ‘GSB’ command structure was rooted in and developed
heavily by the UK emergency services. It was designed to establish a clear
hierarchical […]

Read more



INSIDER THEFT OF $119M WORTH OF COCA COLA IP

What happened? An engineer who worked for Coca Cola and other manufacturers is
alleged to have stolen valuable trade secrets in order to set up […]

Read more



TESLA INSIDER THREAT CASE (KHATILOV)

Tesla Insider Threat Case Study According to the official Filing, Tesla is suing
a former employee and software engineer named Alex Khatilov alleging trade
secret […]

Read more



WARGAMING, CYBER ATTACKS AND ASTRONAUT THINKING

CEO Digital Show This week Lisa was on the CEO Digital show
discussing Wargaming, Cyberattacks, Protecting Against Romance Fraud, &
‘Astronaut Thinking’ in Leadership. Key points […]

Read more



THE 5 BEST WAYS TO SPOT TV LICENCE PHISHING EMAILS

TV Licence Phishing Emails In the UK a licence is required to watch live TV in
the home. With lockdown continuing and people’s reliance on […]

Read more



WHAT IS VISHING?

What is vishing? How to How to defend your organisation against telephone-based
vishing scams

Read more



BEHAVIOUR CHANGE IN YOUR ORGANISATION (SHORT VIDEO)

Getting your staff to change their security behaviour It is often submitted that
fear is bad. Actually, from a behavioural science perspective we know fear […]

Read more



HACKED! RIGHT MATCH SINGLES SUFFERS A DATA BREACH..

Cyber Security Awareness Month Special: “Hacked” What would you do if your
company was hit by a cyber attack? Do you have a plan? A […]

Read more



GET STAFF ENGAGED FOR CYBERSECURITY AWARENESS MONTH

October is ECSM, a month-long European event promoting good cyber security
practices and safety. This years themes are: 1. Cyber First Aid:What to do in
[…]

Read more



CV19 AND KASPERSKY NEXT

At the Kaspersky NEXT event, Cyber Volunteers 19 (CV19) Co-founder and partner
at Red Goat Cyber Security, Lisa Forte discussed with Kaspersky’s

Read more



PRE-ELECTION TRICKS GOES DEEPER THAN SOCIAL MEDIA.

How pre-election manipulation goes deeper than social media. A critical moment
is almost upon us. It will be a test of the protections we’ve tried […]

Read more



INSIDER THREAT $800K ROGUE ADMIN

Rogue Admin: Disgruntled former IT admin Charles E. Taylor quit his job at an
unnamed Atlanta based distribution company before going on a sabotage spree
costing the company $800,000 USD to redress.

Read more



LISA FORTE ON SMASHING SECURITY PODCAST

178: Office pranks, meat dresses, and robocop dogs  May 14th, 2020  |   50 mins
42 secs  coronavirus, data breach, email storm, hacking, k2, lady gaga,
microsoft, […]

Read more



PERMISSIONS CREEP

Permissions Creep, also known as privilege creep, is what happens when an
employee moves between roles in an organisation and keeps the access or
permissions of the previous role.

Read more



SHOULD YOUR COMPANY BAN ZOOM?

As several businesses ditch the popular conferencing tool, Lisa Forte, partner
at Red Goat Cyber Security, calls for calm  Zoom, the free to use video
conferencing […]

Read more



CYBER VOLUNTEERS 19

Do you work in cyber security? Why not sign up to volunteer to help protect
healthcare providers during the Covid-19 pandemic.

Read more



LISA FORTE ON RANDOM BUT MEMORABLE PODCAST

Comically Bad Ultrasonic Berry with Lisa Forte Description Do we need more
positivity in cybersecurity? And are bananas a type of berry? Join us, as […]

Read more



WHY RUN A CYBER EXERCISE?

Your company could have the most detailed response plans in the world but if
they have not been tested they may well be useless when they are most needed. A
cyber security incident is not a good time for seeing if your plans actually
work.

Read more



INSIDER THREAT FRAUD: £4.6M IN SELF-SIGNED INVOICES

Of the three categories of insider threat; theft, fraud and sabotage, insider
threat fraud is often the most complex,  inventive and difficult to detect. This
[…]

Read more



LISA FORTE INTERVIEW WITH DIGIT MAGAZINE

LISA FORTE INTERVIEW WITH DIGIT MAGAZINE Lisa Forte, partner and cyber threat
specialist at Red Goat Cyber, shares her insights about the ‘insider threat’ and
[…]

Read more



AMAZON RING INSIDER THREAT

Ring, the Amazon owned home-security company, has admitted firing four employees
who accessed users’ videos. The employees had access to the video feeds but
exceeded their authorised access by viewing them. This has undoubtedly caused
embarrassment for Ring.

Read more



THE FACEBOOK INSIDER

Friday the 13th  is a day that has been long associated with bad omens. This
became a reality for almost 30,000 Facebook staff though on […]

Read more



TREND MICRO INSIDER BREACH

The Tokyo based cyber security company Trend Micro has revealed it has been the
victim of a sophisticated insider threat attack. Customer records were accessed
[…]

Read more



INSIDER THREAT: FORMER SEC INVESTIGATOR CHARGED

The SEC investigator was charged with several crimes including unauthorized
computer access and disclosure of confidential information. The defendant, Mr.
Cohn, was the MD and […]

Read more



HOW VOICE ASSISTANTS CAN BE USED TO PHISH PASSWORDS

We have seen a wealth of articles on the security and privacy issues around
voice assistants. This week I came across and new and far […]

Read more



RED GOAT INSIDER THREAT REPORT

Insider Threat Report 2019 finally released! Red Goat Cyber Security are proud
to announce the results of their research into insider threat reporting. The
research […]

Read more



3 STEPS TO MAKE CYBER SECURITY AWARENESS MONTH A SUCCESS

October is Cyber Security Awareness Month! A lot of our clients are busy
preparing events and internal campaigns to increase awareness of cyber related
issues […]

Read more



RED GOAT FINALISTS FOR COMPUTER SECURITY AWARDS 2019

Red Goat Cyber Security has been recognised as a finalist in the 2019 Computing
Security Awards. Partner and Co-founder, Lisa Forte, has been selected as […]

Read more



TEISS PODCAST ON INSIDER THREAT

“I really enjoyed making this podcast with Anna Delaney. She always asks hard
interesting questions and it was great fun to discuss some of the […]

Read more



TALES FROM THE ROAD: OSINT IN THE WASHROOM

I recently went for a meeting at a company’s office. This company had a few
floors in a shared office building. Due to a large […]

Read more



ONLINE RADICALISATION AND SOCIAL ENGINEERING

Online radicalisation and social engineering There has been a lot of media
coverage here in the UK about a young woman who previously left the […]

Read more



PARIS RIOTS, SOCIAL PROOF AND CORPORATE SECURITY

I was recently hired to speak at an event in Paris. I love the city however this
particular visit was during an unfortunate time. Paris […]

Read more



THE HUSTLERS OF NAPLES

Social engineering is a fascinating and diverse attack vector because it
exploits human nature and people are generally predictable in their responses.
We focus on […]

Read more



SIMONE – A SOCIAL MEDIA INVESTIGATION

Speaking around the world about social engineering one question comes up almost
every time. Why is social engineering so successful? A key success factor in […]

Read more



INTERVIEW WITH DIGIT

Social engineering and social media risks Here’s a link to an interview with
DIGIT who organise the excellent Scot-Secure event in Edinburgh (among many
other […]

Read more



RECONNAISSANCE FOR SOCIAL ENGINEERING: TALES FROM THE ROAD

Social engineering reconaissance When it comes to reconnaissance and open source
intelligence, research often seems like a digital battle. Using endless pieces
of software, sites […]

Read more



WEBINAR: THINK LIKE A HACKER

We recently did a webinar with APMG on why you need to think like a hacker. They
have uploaded it
here: https://apmg-international.com/events/why-you-need-start-thinking-hacker

Read more



CAN I BORROW YOUR SWIPECARD?

This case involves an accountancy firm based in South East England. The firm had
just lost a big client and as a result had to make some cuts which included
letting a few members of staff go.

Read more



STAY CALM AND (DON’T) PAY THE HACKERS

This social engineering case study highlights how attackers can use curiosity,
urgency and fear to manipulate victims into breaking company protocols and get a
finance employee to willingly transfer £152,000 into the attackers bank account.

Read more



THE ENTHUSIASTIC LAW STUDENT

This case involves a law firm based in the south of England. The firm was of a
reasonable size and, like most law firms, held a lot of very sensitive customer
data.

Read more



CRIMINAL JUSTICE EVOLUTION PODCAST

Patrick Fitzgibbons was kind enough to invite me on to his US based Criminal
Justice Evolution podcast.  We talked about the social engineering threats
facing […]

Read more



THE NOT-SO-SECRET LIFE OF BOARDING PASSES

Have you ever thought about what your boarding pass might say about you? I don’t
mean “oh look at me, I’m flying in Emirates Business Class”, but what data you
might be leaking publicly on that anachronistic piece of paper you discard in
the seat in front of you. Turns out it is an awful lot more than you think…

Read more



THE PRISONERS DILEMMA AND INTELLIGENCE SHARING

Cybercrime is increasing year on year. The 2017 cyber breaches survey shows that
almost half of UK firms have been hit by cyber breach or […]

Read more



EQUIFAX LEAK

In the latest in a truly blockbuster year for data leaks, American credit
reporting company Equifax has announced the loss of highly sensitive data
belonging […]

Read more



LEAK OF THE WEEK: 711M EMAIL ADDRESSES

A French malware researcher has found an online database of 711 million email
addresses, in some cases with the associated passwords for that account. The
list […]

Read more



SOUTH KOREA 2 : TRUST, CYBER-SECURITY AND WANNACRY

In my first article on South Korea I looked at some unique solutions to
protecting citizens and businesses from the cyber threat. In this second article
on […]

Read more



SOUTH KOREA 1: ON THE ALERT

In the first of two blog articles on cyber security and tech in South Korea, I
am looking at the pervasive use of technology in […]

Read more



Training
 * Social Engineering Training Course
 * Insider Threat Program Development and Training
 * Bespoke Cyber Security Training
 * Executive Briefings
 * Webinars

Recent Posts
 * Key risk indicators in cyber security
 * How to write an effective ransomware playbook
 * How to get exec approval for a cyber exercise
 * Get started with crisis communication planning
 * 7 Examples of Cyber Tabletop Exercises

470 Bath Road,
Bristol,
BS4 3AP
Tel: (+44) 117-325-9190
info@red-goat.com
Contact Us




Copyright © Red Goat 2023. All rights reserved.

 * Privacy & Cookie Policy
 * Terms & Conditions
 * Sitemap
 * Sitemap XML

Company number: OC419953

VAT: GB303188036


Menu
 * Training
   
   * Social Engineering Training Course
   * Crisis Management Training
   * Executive Briefings
   * Webinars
 * Cyber Crisis Exercise
 * Crisis Management Services
 * Insider Threat
 * About
 * Resources
   
   * Download The Complete Guide to Running a Cybersecurity Tabletop Exercise
   * Case Studies
   * Blog
   * Smishing
   * Vishing
   * Insider Threat
   * Insider Threat Report
 * Contact