Red Teams have become a common tool for testing enterprise security. They attempt to penetrate security defenses as if they were hackers. Red teams are motivated to be creative and determine the best way to circumvent security measures in place, sometimes by any means possible. Mike has been red teaming since the 1990’s, before the term existed. He breaks down how red teams operate, their objectives, the difference between physical and digital vulnerabilities and how constraints can limit their value.