Services
Strategic Research and Threat Modeling
● Threat Intelligence and Research Monitoring
● Opposition and Disinformation Research
● Landscape Assessments
● Vulnerability Assessments
● Risk Assessments
● Threat Modeling
Auditing
● Organizational Security Audits
● Account Security Access and Controls Audits
● Environmental Security and Controls Audits
● Data Governance Audits
● Policy Audits
● Compliance Standards Audit Review
Policy Development
● Co-Development With Legal Counsel of Security Policies
● Data Retention Policies and Schedules
● AI Usage Security Policies
Operational Security Development
● Finance Operations Security Protocols and Management
● Securing Back Offices
● Compliance Security
● Information Security Management
● Content Inventory and Taxonomy Development
● Asset Inventory and Management
● Sensitive Data Protection
● Securing Devices
● Communications and Media Security
Cybersecurity
● Response
● Incident Response Planning
● Forensics and Malware Analysis
● Pentesting: We work with app developers on fuzz testing and penetration testing for web and mobile applications.
● Vendor Evaluation and Acquisition
● Information Systems Acquisition, Development, and Maintenance
● Email Security
● Cloud Security
● Server and Application Security: We provide Linux server reviews and hardening, as well as application and code security reviews for teams with higher risk profiles
● Compliance Assistance: We assist partners in achieving various regulatory and compliance standards, such as HIPAA, SOC 1 and 2