Cyber Crisis Exercises

An immersive and evolving cyber attack exercise to test your strategic and tactical response to an incident.

Insider Threat Training

High impact, interactive face to face training to raise awareness of insider threat risks to your organisation.

GCHQ Certified Social Engineering training

Train your staff to recognise and defend your organisation against the largest cyber threat.

Experts in Social Engineering, Insider Threats and Cyber Crisis Simulations. Red Goat was founded to mimic malicious tactics and help organisations improve their defences against the current threat landscape.

Effective Social Engineering Training

Train your staff to be your greatest defence with GCHQ certified interactive training. This face to face course equips your staff with the skills to identify & combat social engineering attacks including spearphishing and vishing as well as an understanding of OSINT techniques.

The APMG swirl device logo is a trademark of The APM Group Ltd. Use of this trademark on this with website has been authorised solely for marketing purposes. All rights reserved.

Immersive and Challenging Cyber Crisis Exercises

Put your plans to the test with a bespoke and immersive cyber crisis exercise. Red Goat have conducted high quality and challenging exercises for critical national infrastructure, hospitals and financial services companies.

Insider Threat Training

Stopping the insider threat is as much about deterrence as it is detection. Our informative and engaging training helps equip staff with the skills to identify potential threats and reinforces your organisation’s commitment to challenging this complex threat.

Businesses We’ve Helped

Bristol Airport

“Red Goat were very helpful and provided an excellent training course that was really engaging and helpful to a wide range of our staff”.


“I was hugely impressed by the Social Engineering Awareness Course run by Red Goat Cyber Security. It is one of the first courses I’ve encountered where those who attended it have continued to talk about it long afterwards; a sure sign that the key messages imparted by the trainer have stuck. “

John Stanley MBCI, Risk & Resilience Manager
Salisbury National Health Service Trust

“I was delighted with how Red Goat Cyber Security delivered the cyber security table top exercise.  We have learnt valuable lessons to further improve our plans, processes and check lists and would highly recommend them to other organisations”

Bath hospital

“Excellent course and great scenarios. We would recommend this course to anyone, really informative and relaxed. Rarely is there a course that is both informative and enjoyable. Really good.”

Futures Housing Group

“Red Goat were really helpful in tailoring a course to our needs. The trainer was really engaging.”


Insider Threats: £4.6m in self-signed invoices

Of the three categories of insider threat; theft, fraud and sabotage, fraud is often the most complex,  inventive and difficult to detect. This case however, has a certain simplicity to it. The case concerns a Mr Kabbaj who worked for an “unnamed global internet...
Scot-Secure 2020


LISA FORTE INTERVIEW WITH DIGIT MAGAZINE Lisa Forte, partner and cyber threat specialist at Red Goat Cyber, shares her insights about the ‘insider threat’ and how to protect against it.  How has the insider threat evolved in recent years? Firstly, we now live in a...

Amazon Ring Insider Threat

What happened? Ring, the Amazon owned home-security company, has admitted firing four employees who accessed users’ videos. The employees had access to the video feeds but exceeded their authorised access by viewing them. This has undoubtedly caused embarrassment for...

The Facebook Insider

Friday the 13th is a day that has been long associated with bad omens. This became a reality for almost 30,000 Facebook staff though on Friday 13th December. Almost 30,000 employee payroll records were stolen. The theft left information security professionals...

Trend Micro Insider Breach

The Tokyo based cyber security company Trend Micro has revealed it has been the victim of a sophisticated insider threat attack. Customer records were accessed and exfiltrated by an employee then used by attackers in a vishing attack on Trend Micro customers....

Insider threat: former SEC investigator charged

The SEC investigator was charged with several crimes including unauthorized computer access and disclosure of confidential information. The defendant, Mr. Cohn, was the MD and Chief Compliance Officer at GBP Capital Holdings. Cohn allegedly accessed compromising...

How voice assistants can be used to phish passwords

We have seen a wealth of articles on the security and privacy issues around voice assistants. This week I came across and new and far more concerning article on this by Ars Technica: “Amazon- and Google-approved apps turned both voice-controlled devices into "smart...

BBC Tech Tent: Insider Threat Reporting listen from 17:10

Red Goat Insider Threat Report 2019

Insider Threat Report 2019 finally released! Red Goat Cyber Security are proud to announce the results of their research into insider threat reporting. The research examines reporting observed in intentional insider threat cases and the factors that may influence the...

3 Steps To Make Cyber Security Awareness Month A Success In Your Company

October is Cyber Security Awareness Month! A lot of our clients are busy preparing events and internal campaigns to increase awareness of cyber related issues in October. However with limited time and too many options, it can seem like too much to fit in to your...

Reach Us

+44 117 325 9190

Contact Us