General Controls Assessment
Evaluating an organization’s control over its data center and network operations to secure the reliability, security, confidentiality, and integrity of data infrastructure and digital assets.
Physical Threat Assessment
Evaluating and improving the security of physical locations, including access controls, surveillance, and intrusion detection.
Insider Threat Assessments
Conducting simulated insider threat scenarios to evaluate and improve an organization’s capability to detect and respond to insider risks.
Privacy Impact Assessments
Assessing the impact of an organization's processes on an individual's privacy and providing recommendations to reduce risks.
Ethical Hacking
Providing ongoing ethical hacking services on a subscription basis to continually identify and mitigate vulnerabilities.
Internal and External Vulnerability Testing
Internal vulnerability testing identifies security risks that already exist within an organization’s internal network. External testing is a proactive approach, finding entry points that external attackers might exploit. These are done on a quarterly basis.
Internal and External Penetration Testing
Internal pen tests are conducted within an organization’s network to detect vulnerabilities. External pen tests are conducted remotely, searching for vulnerabilities in internet-facing assets like web, mail, and FTP servers. These are done on a quarterly basis.
Team Color Exercises
These are simulated attacks (Red Team) and defense (Blue Team) exercises to test and improve an organization's cybersecurity posture.
Cybersecurity Awareness
Educating employees on security best practices as well as recognizing and responding to potential threats.
Compliance
Assessing an organization’s adherence to regulatory requirements and providing guidance on achieving and maintaining compliance.
Simulations and Tabletop
A role-playing activity in which participants respond to large-scale simulations provided by facilitators. This will prepare organizations to address significant cyber incidents.
General Education and Speaking
Security best practices training for teams, where they learn to recognize and deal with potential threats.