iCAST – Intelligence Led Cyber Security Testing
One of EDGENETIC’s additional services that it provides to its broad range of financial services clients is iCAST testing. This intelligence led framework was introduced by the Hong Kong Monetary Authority (HKMA) in response to the ever changing cyber security landscape.

iCAST – Intelligence Led cybersecurity Testing

One of EDGENETIC’s additional services that it provides to its broad range of financial services clients is iCAST testing. This intelligence led framework was introduced by the Hong Kong Monetary Authority (HKMA) in response to the ever changing cybersecurity landscape.

iCAST is an innovative regulatory requirement that does not just rely on a strategy that is focussed on Penetration Testing alone. The focus of the iCast framework is to deliver a Threat Intelligence based scenario test, with the testing element focusing on ‘Red Teaming’. The Threat Intelligence phase focuses on:

  • Reviewing open source intelligence relating to an organisation
  • Defining scenarios that reflect real work attack vectors
  • Reviewing of TTP’s and modus operandi of likely Threat Actors
  • Providing a list of actionable intelligence to confirm the right approach for the Red Team phase

Reviewing and Defining Stage

Upon completion of the Threat Intelligence phase, EDGENETIC will help an organisation to define the likely scenarios for the red teaming phase. The iCAST framework encourages organisations to define a list of key assets that it is trying to protect and use the output of the threat intelligence to define what tactics and approach should be used to carry out the attack phase of the assessment. During this phase, the EDGENETIC team will launch various attacks, such as phishing or insider threats to mimic real work threat actors.

Attack Replay

After the Red Team phase is complete, EDGENETIC will provide the final stage of the engagement, known as the Attack Replay. In this phase, EDGENETIC will work closely with the Blue Team and re-create some of the scenarios to see how the defensive layer of the business was able to react to the testing phase.

Why Work With EDGENETIC?

Since iCAST was first introduced several years ago, EDGENETIC has been engaging with global banks that are trying to protect their most important systems. Whether it’s delivering CBEST, GBEST, iCAST or AASE, EDGENETIC’s teams are well placed to help organisations deliver an end-to-end engagement, including Threat Intelligence and Red Teaming combined.

These services have been delivered using EDGENETIC’s in-house tooling and a combination of open-source tools to ensure that companies understand how best to protect themselves. Providing a scenario-based engagement isn’t just about finding a way into an organisation, it’s also about helping companies to get better at defending themselves over a longer period of time, in case they ever experience a real-life attack.

Cybersecurity doesn’t stand still, so working with an innovative company like EDGENETIC will benefit you in the long term. Contact your local team to find out more.


Frequently Asked Questions About iCAST – Intelligence-Led cybersecurity Testing

Who should conduct iCAST testing?

Under the HKMA Cyber Resilience Assessment Framework, banks that aim to attain the “intermediate” or “advanced” maturity level must conduct iCAST.

Who should conduct iCAST testing?

Some organisations will be asked to complete an annual iCAST assessment by HKMA. The value in undertaking this service is as follows:

  • A better understanding of how likely threat actors will try and target you
  • Clarification of how good your business is at protecting its key assets
  • A greater understanding of your ability to identify when an adversary is trying to attack
  • A more robust cyber strategy that encompasses attack and defence

What accreditations do our specialists have?

All of our specialists are CREST certified and have achieved the highest accreditations for Penetration Testing, Red Teaming, Incident Response services and Threat Intelligence. We are also authorised service providers for iCAST and TIBER in the heavily regulated financial services industry. 

Frequently Asked Questions about Data Privacy Security

What is an incident response policy?

An Incident response plan or policy is a process you create before you experience a cyberattack. This is so that your team has a procedure to follow when you do experience a data breach. EDGENETIC follows the CREST Cybersecurity Incident Response process which is broken down into 3 phases: preparation, response, and follow up. Having a breach plan gives you the confidence to quickly nullify any threat to your data privacy security.

Why is data privacy security important?

Although it has always been important, the implications and need for higher security are coming into play now that technology is indispensable to everyday life. Using apps, browsing websites, and shopping online are all examples of how your data will be stored and managed online. For organisations today, the threat of cyber theft is a pertinent one. Having comprehensive data privacy plans in place can reduce and mitigate the risks of such events.

Does EDGENETIC practice sustainability?

As a company with a global footprint, sustainability is an area of importance to us. We are a registered ‘Investor in People’ organisation. Taking a cue from ISO 14001, we have strong sustainability practices put in place. Our organisation also hires fairly and equally, across gender and race. By working with us, you can rest assured that we implement data privacy security measures with ethics at the core of our mission.

Get in touch via the form below and get a free quote from us for our Red Team Security Testing services.