Placeholder for Markus spiske iar af B0 Q Qw unsplashMarkus spiske iar af B0 Q Qw unsplash
Assumed breach

Stop asking if you'll be breached. You will be.

An assumed breach exercise starts where most security thinking stops — with an attacker already inside. We test what happens next, and whether your organisation is ready for it.

Introduction

The question is not whether — it is what happens after

Perimeter defences are important. But no perimeter is impenetrable. Assumed breach exercises skip the entry question entirely and focus on what matters most to a CISO: if an attacker is already inside your environment, how far can they go, and would you even know?

It is a more honest test than traditional penetration testing — and often a more uncomfortable one. That is precisely the point.

A fundamentally different starting point

Traditional security testing tries to get in. Assumed breach testing starts inside — with a foothold already established — and asks a harder set of questions about what your organisation can detect, contain, and stop from that point on.

Traditional testing

Can an attacker get through your perimeter? Focus on initial access and entry points.

Assumed breach

An attacker is already in. How far can they go, and can your team stop them before real damage is done?
Core scenarios

What we test — and why it matters

icon Lateral movement & privilege escalation

Lateral movement & privilege escalation

Lateral movement & privilege escalation Starting from a standard user account or compromised endpoint, our team attempts to move through your environment — escalating privileges, accessing sensitive systems, and reaching high-value targets. + Active Directory enumeration & attacks + Credential harvesting & pass-the-hash + Kerberoasting & privilege abuse + East-west movement across network segments + Domain controller compromise attempts
icon Detection & response validation

Detection & response validation

Every move our team makes is a test of your detection capability. We document precisely which actions were detected, which were missed, and how long it took your SOC to identify and respond to each technique. + MITRE ATT&CK technique execution & logging + SOC alert validation — detected vs. missed + Mean time to detect & respond measurement + Analyst response quality assessment + Detection gap mapping & recommendations
Why Nomios

What makes our approach different

Attackers who understand defenders

Our team operates your SOC day-to-day. That means our assumed breach exercises are calibrated to find the gaps your detection tools genuinely miss — not just theoretical weaknesses.

Findings that drive immediate action

Detection gaps identified during an exercise can be addressed in your live environment the same week — not queued for a future project cycle.

Board-ready narrative

The attack timeline and findings are documented in a format that translates directly into a board conversation about resilience — not just a technical vulnerability list.

Safe, controlled, and repeatable

Every exercise is conducted within agreed boundaries, with rollback procedures in place. We test hard — but we never put your production environment at genuine risk.
Get in touch with us today

How far could an attacker get inside your network?

Let us find out — before someone else does. Talk to our team about scoping an assumed breach exercise for your environment.

Placeholder for Portrait of ethnic man looking awayPortrait of ethnic man looking away
Updates

Latest news and blog posts