Growing Cybercrime Sophistication Inspires New Security Strategies

Coalfire’s New Threat Modeling and Attack Simulation Approach is Designed to Maximize Security Investments

WESTMINSTER, Colo., April 14, 2020 /PRNewswire/ — Coalfire, a provider of cybersecurity advisory and assessment services, today introduced its proprietary Threat Modeling and Attack Simulation (TMAS) methodology designed to help organizations validate their own security effectiveness, guide contingency strategies, and justify overall security operations.

“The threat landscape is becoming more sophisticated, and security professionals have to look beyond the expected,” said Mike Weber, Vice President, Coalfire Labs. “With our new TMAS approach, Coalfire brings our clients a unique methodology to plan for the unexpected, optimize security systems and workflows, and to establish a baseline command of security operations toolsets.”

The Coalfire TMAS engagement incorporates the use of purple team simulations to represent both attacker and defender postures, customized according to each client’s priorities. In addition, the Coalfire Labs TMAS team identifies low-priority, overlooked, and unexpected threat vectors with the following approach:

  • Evaluate the risk management strategy to determine how the organization has prioritized security investments
  • Identify threat actors and threat vectors that could leave the organization vulnerable based on the prioritization of risks
  • Develop attack simulations based on the application of the MITRE ATT&CK framework and the organization’s threat model
  • Execute attacks, identify security program strengths and weaknesses, and use these to enhance the threat model and inform future attack simulations

An example set of attack scenario categories derived from threat modeling includes:

  • Insider threat access to sensitive data
  • Compromised customer account used to attack application interfaces
  • Supply chain / software dependency compromise
  • “Malware-infected” workstations controlled by an attack on the internal network
  • Spear-phishing attacks, targeting high-profile individuals
  • Physical attacks to breach the perimeter and gain access to the network

“Our testers can carry out any attack vector against any organization by physical access, social engineering, technical attacks, or non-traditional IoT solutions,” said Weber. “Coalfire’s TMAS engagements are designed to build a threat model unique to each business, and to complement additional initiatives such as vulnerability assessments and defensive diagnostics.”

About Coalfire
Coalfire is the trusted cybersecurity advisor that helps private and public sector organizations avert threats, close gaps and effectively manage risk. By providing independent and tailored advice, assessments, technical testing and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives and fuel their continued success. Coalfire has been a cybersecurity thought leader for nearly 20 years and has offices throughout the United States and Europe. For more information, visit

For media inquiries:
Mike Gallo
(212) 239-8594

Cision View original content to download multimedia:

SOURCE Coalfire

Print Friendly, PDF & Email