Red Team
How to Succeed By Thinking Like the Enemy
-
- $17.99
-
- $17.99
Publisher Description
Essential reading for business leaders and policymakers, an in-depth investigation of red teaming, the practice of inhabiting the perspective of potential competitors to gain a strategic advantage
Red teaming. The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce.
In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.
PUBLISHERS WEEKLY
Zenko, a security expert and fellow at the Council on Foreign Relations, explains, in absorbing detail, the value of red teams, groups formed to act as devil's advocates. While red teams are frequently used by the U.S. military, they are relatively new to the corporate world. Zenko shows just how these practices can help companies improve performance and identify failings. He advocates three specific techniques: simulations, vulnerability probes, and alternative analyses. He goes on to identify six red-teaming best practices (such as "have a big bag of tricks" and "be willing to hear bad news and act on it"). Zenko provides interesting examples of how U.S. intelligence agencies have used red-teaming, notably for topics related to homeland security. Shifting focus from the government and the military, Zenko looks at predatory competitive practices in a chapter that will hit home with every executive. From business war gaming to physical and cyber penetration testing, he shows just how vulnerable corporations are. He closes with a look at realistic outcomes and pitfalls to avoid. Armed with case studies ranging from the discovery of vulnerabilities in the Verizon network to the hunt for Osama bin Laden, Zenko offers readers much to consider and an effective way to take action.