Services


Strategic Research and Threat Modeling

●        Threat Intelligence and Research Monitoring

●        Opposition and Disinformation Research

●        Landscape Assessments

●        Vulnerability Assessments

●        Risk Assessments

●        Threat Modeling


Auditing

●        Organizational Security Audits

●        Account Security Access and Controls Audits

●        Environmental Security and Controls Audits

●        Data Governance Audits

●        Policy Audits

●        Compliance Standards Audit Review


Policy Development

●        Co-Development With Legal Counsel of Security Policies

●        Data Retention Policies and Schedules

●        AI Usage Security Policies


Operational Security Development

●        Finance Operations Security Protocols and Management

●        Securing Back Offices

●        Compliance Security

●        Information Security Management

●        Content Inventory and Taxonomy Development

●        Asset Inventory and Management

●        Sensitive Data Protection

●        Securing Devices

●        Communications and Media Security



Cybersecurity

●        Response

●        Incident Response Planning

●        Forensics and Malware Analysis

●        Pentesting: We work with app developers on fuzz testing and penetration testing for web and mobile applications.

●        Vendor Evaluation and Acquisition

●        Information Systems Acquisition, Development, and Maintenance

●        Email Security

●        Cloud Security

●        Server and Application Security: We provide Linux server reviews and hardening, as well as application and code security reviews for teams with higher risk profiles

●        Compliance Assistance: We assist partners in achieving various regulatory and compliance standards, such as HIPAA, SOC 1 and 2