Source: https://www.cemla.org/actividades/2020-final/2020-10-meeting-cybersecurity/3. RUTTENBERG_Threat Lead Penetration Testing.pdf