Resilience Framework

  • This educational briefing provides an overview of current events, cyber tactics, and techniques used by malicious actors.

    • Identify the C-Suites roles and responsibilities.

    • Define terms related to Cybersecurity.

    • Understand security-related laws, guidelines, and policies that mandate some of the tasks and responsibilities of management.

    • Cyber Insurance

    • Acceptable Risk and Mitigation

    • Reputational Damage

  • This educational briefing provides an overview of current events, cyber tactics, and techniques used by malicious actors.

    • Identify the C-Suites roles and responsibilities.

    • Define terms related to Cybersecurity.

    • Understand security-related laws, guidelines, and policies that mandate some of the tasks and responsibilities of management.

    • Cyber Insurance

    • Acceptable Risk and Mitigation

    • Reputational Damage

    • Scenario Based Testing of Incident Response Plan

    • Identify Gaps to update

    • Document Lessons Learned

    • Remediate – update Policies, Plan, Business Impact Analysis, Risk and Probability Matrix

    • Retest for effectiveness of updated plan

    • Scorecard of each exercise to measure maturity and progression

  • Discuss Current Events in Cybersecurity and Understand:

    • Cybersecurity Tactics

      • Malware

      • Phishing

      • Whaling

      • Antivirus

    • What a Trojan Horse Is

    • Password Management

    • Email

    • SPAM

    • How to Respond

    • Individual Assessments

    • Briefing and Exercise for Industrial Connected Systems (HVAC, IoT connected devices, and other areas) focusing on best practices and emerging policies.

    • Exercise the organization’s existing incident response plan, policy and procedures, operators are put through real life threat scenarios

    • The Operators will be required to detect, recognize, respond to, mitigate, and recover from an ongoing cyber attack in an operational environment.

    • The results from the exercise will provide the organization with the information to develop a remediation plan across.

    • Output provides the client with information needed to develop a remediation plan to improve readiness.

    • Understand security-related laws, guidelines, and policies that mandate some of the tasks and responsibilities of management

    • Discuss current Cybersecurity events, and how they affect the organization

    • Identify laws, regulations, policies, and procedures that guide the organization

    • Identify roles and responsibilities throughout the organization and the units/areas there within

    • Scenario Based Testing of Incident Response Plan

    • Exercise organizational policy base for continual improvement of the organization’s IT Security Policy Framework.

    • Remediate – update Policies, Plan, Business Impact Analysis, Risk and Probability Matrix

    • Retest for effectiveness of updated plan

    • Scorecard of each exercise to measure maturity and progression

Foundation

  • Cybersecurity Awareness

  • Executive Briefings

  • Skills Assessments and Training

    Transformation

  • Training

  • Testing

  • Remediation

Collaboration

  • Virtual Labs Environment

  • Governance

  • Risk Mitigation

    Optimization

  • Outsource SOC

  • Continuous Training, Briefings, Testing, Remediation, and Risk Mitigation

  • Reporting and Metrics

Our Services

For government entities, non-profit organizations, small and medium-sized businesses, and corporations.