Quick wins for starting small

Don’t wait for perfect conditions. Start with simple exercises that build capability and demonstrate value.

Week 1: Phishing simulation

Red team: Send realistic phishing emails to small group. Track who clicks links or submits credentials.

Blue team: Monitor email security alerts, authentication logs, unusual web traffic. Practice response to compromised credentials.

Learning: Do security awareness training and email filtering work? Can blue team detect credential submission? How quickly can compromised accounts be disabled?

Week 2: Atomic Red Team test

Red team: Run pre-built Atomic Red Team tests for common TTPs (credential dumping, persistence mechanisms).

Blue team: Monitor EDR, SIEM for alerts. Investigate and respond to detected activity.

Learning: What does your EDR actually detect? Which MITRE ATT&CK techniques are visible? Where are blind spots?

Week 3: Lateral movement simulation

Red team: Simulate attacker with compromised account attempting lateral movement to additional systems.

Blue team: Monitor authentication attempts, unusual access patterns, account usage across multiple systems.

Learning: Can blue team detect lateral movement? How quickly? What network segmentation or access controls limit attacker options?

Month 2: Assumed breach scenario

Red team: Start with provided credentials (simulating successful phishing). Attempt privilege escalation and access to sensitive data.

Blue team: Monitor for privilege escalation attempts, sensitive data access, suspicious account behaviour.

Learning: If attacker gets initial access, how far can they go? What detections catch post-compromise activity?

Quarter 2: Full engagement

Red team: Multi-stage attack from initial access through objectives (data exfiltration, system persistence, impact demonstration).

Blue team: Full incident response including detection, containment, eradication, recovery.

Learning: Does complete defensive program work end-to-end? What breaks under pressure?