CyberKnight capabilties

S
CYBER KNIGHT
Primary Contact
Ms Rama
+85368814100
rs@icyberknight.com
Secondary Contact
Mr Chetan Singh
+918527296800
cs@icyberknight.com
Overview
Cyber Knight is one of The leading IT Security firms specializing in providing Enterprise Risk
Services and Defensive Security Services. We has a proven track record of assisting
numerous global organizations obtain and maintain desired levels of online security.
Enterprise Risk Services (ERS) Include
▌ IS/IT Audit & Compliance
▌ Managed Security Services (SOC/NOC)
▌ Risk & Incident Management Services
▌ Information Security Framework
▌ Information Security Governance
▌ Detailed Cyber Risk Assessment and
Treatment
▌ Information Security Training (Awareness/Secure Coding)
▌ Performance Testing and Bench mark services
▌ Penetration Testing
▌ Cyber Attack Simulations
▌ Intruder Attack Simulation
▌ Internal Penetration Testing
▌ Information Security framework Built-Operate-Transfer Model
Overview
Cyber Knight provides a unique portfolio in the field of cyber investigation, to address modern
challenges with the utmost efficiency with leading defensive digital intrusion solutions.
Defensive Security Services (DSS) Include
▌ Cyber Attack Response Simulation
▌ Cyber Attack Response plan and Drills
▌ Competitive Intelligence Gathering
▌ Social Engineering Awareness Trainings
▌ Cyber Security framework Built-Operate-
Transfer Model
▌ Defensive Security Training for Developers.
▌ Passive and Active Investigative Services
▌ Vulnerability Research & Support
▌ Internal Cyber Security Operation Center plan and setup
▌ Cyber Security Management
Overview
Cyber Knight provides a unique portfolio in the field of Managed Security Services, to address
Security Operational challenges with the utmost efficiency with rich experience in managed
security services.
Managed Security Services (MSS) Include
▌ Security Event Management& Incident
Response
▌ Managed Web Defense
▌ Managed Security Controls
▌ Managed Security Analysis
▌ Managed GRC Automation
▌ Managed Remediation
▌ Security Process Management
▌ Security Process Support Desks
Research &
Support
Active and
Passive
Investigations
Defensive
Security
Training
Competitive
Intelligence
Gathering
Cyber Knight
Cyber Knight, through its experience and
industry relationships, presents
compelling value to customers
▌ Extensive experience in strategy
development
▌ Deeper understanding in industry
segments
▌ Existing relationships with leaders
across verticals
▌ Domain Expertise across the
required verticals
DOMAIN
EXPERTISE
BUSINESS
INSIGHT
INDUSTRY
LINKS
INDUSTRY
KNOWLEDGE
• Examination of the
management
controls within an
Information
technology (IT)
infrastructure
IS/IT Audit &
Compliance
• Identifying,
quantifying, and
prioritizing (or
ranking) the found
vulnerabilities
Penetration
Testing
• Systematic
approach to
managing an
organization's
security needs
Managed
Security
Services
• An unplanned
interruption to an
IT Service or a
reduction in the
Quality of an IT
Service
Risk & Incident
Management
• Advanced and
specialized
information security
training for infosec
professionals
Information
Security
Training
• Used to determine
the speed or
effectiveness of a
computer,
network, software
program or device
Performance
Testing &
Benchmark services
Our ERS Services
IS/IT Audit and Compliance
IS/IT Audit and Compliance
Evaluates controls related to the organizations information processing
systems. IT/IS audits includes and assessment of data, networks, hardware,
applications, databases, servers, contracts, software/hardware licensing,
security, business continuity, access authorization and compliance with
organizations policies and procedures.
Offerings
Technology Services
• Authentication Management
• Safe Browsing
• Cyber Intelligence
• Data Leakage Prevention and Forensic Suite
• Domain Name Services
• Governance Risk and Compliance
• Malware Management
• Security for Endpoints
• Social Media and Brand Protection
• The Human Firewall
“We Do Authentication, You Do Your
Business As Usual”
Our Authentication Management
Solution
Our Authentication Management deploys
world leading client recognition and access
management systems. They are able to
secure billions of users accounts. Our
authentication solution and access control
provides solutions which are changing the
way businesses interact and authenticate
their users which is done remotely. Our
solution is simple to deploy and it conforms
to respect your organisations privacy,
security standards and compliance
requirements.
Keys to Our Authentication Management
Easy Onboarding
We offer you easy digital enrolment
experiences which are spread across our
service applications and delivery channels.
Adaptive Authentication
When using our easy cost effective
technology you will receive trustable
identity validations & multi factor
authentication with lesser effort than typing
a password.
Unified Access Management
Make use of all our features through a
developer-friendly Rest API. This is our
single solution for all your authentication
needs.
Why Choose our Authentication Management
We offer you a system which is:
Secure
Convenient
Multimodal
Compliant
Integrate
Scalable
Future-proof
Provisioned
Authentication Management
Most of the threats and attacks that appear on
our devices come from the web after sneaking
pass the security measures which we enabled.
Our solution allows users to safely browse the
Internet without having the fear of getting
compromised. Our solution augments existing
defenses to keep malware and zero-day exploits
off all endpoints.
What is Safe Browsing:
Executes active web content in a remote
disposable container
Makes websites a safe interactive content
stream
Delivers natural browsing experience for users
Browse with Confidence
Users can click without the fear of data exploits,
ransomware, malware attacks and other threats
Integrated file sanitization for safe downloads
It increases productivity
How Our Solution Keeps Malware Out
Our solution does not require installation and
does not interrupt the work flow. Below you
will see how our solution works:
A user opens up a browser
Our tool instantly powers up a virtual browser
in a remote Linux container
The website’s code executes in the virtual
browser which is nowhere near to the end
users device
To prevent leakage of sensitive data between
sessions, each browser session or tab gets
its
very own isolated container. When a session
is closed or inactive, the container is
destroyed, along with any malicious code
Files which are downloaded are scanned and
cleansed using the pre-integrated sanitization
tool before they’re released to the user
Safe Browsing
Cyber Intelligence detects and helps
investigate external and insider threats
across on-premises, cloud and hybrid
environments. Our solution is built to
support the most demanding workloads of
security analytics for the modern
enterprise.
Our solution fuses together unique
machine learning algorithms, world-class
security research and in depth critical
security data. It will help protect you from
both known and unknown attacks by
detecting threats early.
Detection
By use of our solution, we will detect malicious
activity by collecting multiple data sources,
network traffic, event logs, VPN data, and much
more to create a coherent behavioural profile.
Cyber Intelligence comes with a set of
deterministic models that identify both common
and newly discovered implementations of
attacker techniques such as Pass-the-Hash,
Overpass-the-Hash, Golden Ticket and other
techniques.
Prevention & Isolation
Our solution shows the attack as a contextual
alert timeline, where each individual alert
includes both description of the malicious
activity that triggered it, as well as the required
onward response steps which should be taken.
Our solution provides alerting and profiling
information on malicious activity with the tools
and metadata that are required for further
investigation.
Cyber Intelligence
Our solution helps your organisation from
intentional or accidental insider threats. Our
solution provides you with analytics which
provides you with actionable context &
intelligence. It can be deployed on your
system without timeouts. From installation our
tool will start protecting your organisation from
data leakages immediately. By using our
solution you have overall control of all the
secrets that within your company.
What our solution provides you?
• Control of confidential documents
• Control data channels
• Detect unauthorized actions of employees
& stop them
• User visibility
• Patterns of known behaviour
• User behaviour intelligence
Our Solution Puts An End To:
• Data Exfiltration
• IP Theft
• Credential Misuse
• Credential Theft
• Account Takeover
• & Much More
More Than Just Our DLP Solution
• Our DLP Solution has a Forensic Suite
integrated into it and provides more
capabilities:
• Control not only data, but human
behaviour as well
• Perform audit of all corporate processes
• Detect suspicious actions of employees
• Investigate and collect evidence
• Prevent thefts and other types of corporate
fraud
Data Leakage Prevention and Forensic Suite
Security, reliability, performance. The reasons your business can count on us to secure
this cornerstone of your connected world. Just what you want in your DNS.
Functions of our DNS
Our DNS comes in two categories:
Authoritative DNS
Enterprise
Our DNS is an enterprise grade, managed authoritative DNS service that ensures 100% website
availability along with built-in security for superior protection.
Small Business
Our DNS also offers packages for small to medium sized businesses to manage their DNS
needs.
Recursive DNS
Enterprise
Our Recursive DNS is an enterprise grade, cloud-based recursive DNS service that delivers fast
and reliable access to vital online applications with built-in security and threat intelligence.
Small Business
We also offer a Recursive DNS service that enables users, families and small businesses to
experience a faster and safer online experience.
Domain Name Services
ur solution offers a time saving, web based
service which is designed to help an
organisation manage their governance,
risk and compliance. It utilises of a self-
service concept and management by
exception. This ensures that time is not
wasted on tasks which are not necessary.
Key Advantages:
• Improved Information Governance
coordination – Dramatically increase the
Information Governance coordination
within your organisation
• Better Information Governance visibility
– Provide your management and all staff
with visual dashboards showing the state
of operational compliance
• Greater Information Governance
efficiency – Boost operational efficiency
by providing automated processes that
simplify key tasks making compliance
easier to achieve
Furthermore we have detailed risk courses
for:
• Employees who decide to quit their job and
then causing jeopardy in the work flow
• Employees causing inside attacks
• Employees who snoop around and choosing
to make extra money on the side using
organisation’s material
• Employees creating a fraud scheme
• Leaking commercial secrets due to
blackmail and deliberate sabotage.
We have the perfect package to suit your
organisation with regards to employee
profiling and behavioural patterns, these
packages are broken down into:
• Guide on risk group control
• Guide on how to protect against fraudsters
inside a company
• Guide on how to control human behaviour
• Data Protection Courses
• GRC-ISMS Courses
Governance Risk and Compliance
Our Malware Management is an easy to use business security solution, which delivers
superior proactive protection from viruses, spyware, rootkits, spam, phishing and other
malware.
Functions of our Malware Management
Our Malware Management Solution allows you to create centralized reports on the security
status of your networked or stand-alone computers. We offer security which allows you to have
a full range of both virtualised and physical environments:
• Identifying network security issues, threats and vulnerabilities.
• Monitoring and ensuring compliance with the organization’s security policies.
• Checking and assessing the network security status.
• Monitoring security incidents and malware activity.
• Providing upper management with easy-to-interpret data on network security.
• Next Generation Firewall (combination of enterprise class firewalling with application
recognition)
• Virtual Next Generation Firewall (runs on private, public and hybrid clouds)
Malware Management
Our Endpoint Solution provides you with the only platform that defends every endpoint
against all types of attacks, including Ransomware! Our solution is a signature-less which
means no daily or weekly updates.
Protect What Matters
Our solution has machine learning & AI applied to it hence our platform does not need prior
knowledge of an attack. The threat landscape is always evolving but our platform is ready to stop
attacks that have not yet been released. With our platform you are free to use your technology as
you please.
Our Endpoint Protection Warranty
We stand behind our solution and with our valued customers. We offer you up to $1 Million in
ransomware protection. Think smart and get the assurance of security with our Endpoint
Protection Solution.
Security for Endpoints
Managed Security Services
Managed Security Services
Managed Security Services(MSS) are network security services that have been outsourced to a service provider. Managed Security Services (MSS) is a
systematic approach to managing an organization's security needs.
On-site consulting: This is customized assistance in the assessment of business risks, key business requirements for security and the development
of security policies and processes. Consulting may also include security product integration and On-site incident response and forensics.
Remote perimeter management: This service installs and upgrades the firewall,Virtual Private Network(VPN) and intrusion detection hardware and
software, commonly performing configuration changes on behalf of the customer
Managed security monitoring: This is the day-to-day monitoring and interpretation of important system events throughout the network, including
unauthorized behavior, malicious hacks and denials of service (Dos), anomalies and trend analysis. It is the first step in an incident response process.
Penetration and vulnerability testing: This includes one-time or periodic software scans or hacking attempts in order to find vulnerabilities in a
technical and logical perimeter. It generally does not assess security throughout the network, nor does it accurately reflect personnel-related
exposures due to disgruntled employees, social engineering, etc.
Compliance monitoring: This includes monitoring event logs not for intrusions, but change management. This service will identify changes to a
system that violate a formal security policy for example, if a rogue administrator grants himself or herself too much access to a system. In short, it
measures compliance to a technical risk model.
five categories of managed security services
• Green Services
• Maturity Assessment
• Cyber Governance
• Malware Management
• Blues Services
• Maturity Assessment
• Cyber Governance
• Malware Management
• Cyber Threat Intelligence
• Bronze Services
• Maturity Assessment
• Cyber Governance
• Malware Management
• Cyber Threat Intelligence
• Cyber Security Awareness
• Silver services
• Maturity Assessment
• Cyber Governance
• Malware Management
• Cyber Threat Intelligence
• Cyber Security Awareness
• Cyber Security Technology Controls
• Digital Forensics
• Platinum Services
• Maturity Assessment
• Cyber Governance
• Malware Management
• Cyber Threat Intelligence
• Cyber Security Awareness
• Cyber Security Technology Controls
• Digital Forensics
• Online Brand and Social Media Policing
• Value Added Services
Offerings
24 x 7
monitoring
24 x 7 Alerts
& Advisories
Compliance
Administration
Audit & reporting
Forensics
Vulnerability
Management
Incident
management
Change
management
Configuration
management
Managed Security Services
Cyber Attackers are Creative and Smart
Security Reality
The Attack Surface has Grown
Consequences of IT Sprawl
Are Fundamental Questions been Addressed?
• What is that you are Protecting?
• What are you protecting yourself from?
• How do you Prioritize? And how often do you prioritize?
• How do you check that your efforts are effective?
Our Offerings
▌ Managed Firewall
▌ Managed SIEM
▌ Managed Two Factor Authentication
▌ Managed Updates and Patches
▌ Email and Web Filtering
▌ Managed Anti-Malware Protection
▌ Data Protection and Recovery
▌ Security Reporting and Dashboard
▌ Endpoint Protection
▌ Rapid Response
Why Cyber Knight?
End to End + Multi Layer = Complete
CKPL
Defensive services
Defensive services
Systems & Networks Hardening
Endpoint Security
Continuous event log monitoring from endpoints and
security devices
Audit of Infrastructure and Remote Access Methods
Counter Intelligence Services
INFORMATION
GATHERING
PROCESS &
COLLATION OF
INFORMATION
INTELLIGENCE
ANALYSIS &
PRODUCTION
INTELLIGENCE
INFORMATION
DISSEMINATION
REEVALUATION
PLANNING &
DIRECTION,
TARGET AND
OJECTIVE
DEFINITION
Intelligence Gathering
PASSIVE INTELLIGENCE GATHERING
35
• Search Engines and File sharing
• People Search
• Social Networking
• Whois Record
• Criminal Record
• Reverse Phone Lookup
• Job Listing
• Online Public Record
• Public Disclosures
• Darkweb Commerce Search
Types Of Data Collected
Network Block, IP information, IP Location
Make & Model of ADSL / Wireless / 4G Router
Desktop/Laptop/Mobile Device OS information / Browsers,
Mobile Provider Information including Roaming details, IMSI, Porting Data
Trace Of Published Stolen Records From In-depth Internet Search
Identification DOf People ealing With IPR Theft
Date And Timestamp Of IP Darkweb Sale Records (From Blockchains)
Incident Response Management
Incident
Reporting
Evaluating, correlating &
Prioritizing each report
Investigating each report or
set of related reports
Provider reviewing reports of
suspicious system & network
behavior & events
Intrusion
Detection
Intrusion
Response
Audit Endpoint and Event Logs
Performing forensic analysis
Preserving the evidence
Recommending improvement
actions
Proposed Team Structure
We propose a team structure, which would
ensure reviews and quality check at
multiple levels
SteeringCommittee
Partner/Director
• Responsible for owning
& delivering project to
broader organization
Provides direction &
alignment between
project, organization &
activities
ProjectManagementteam
SeniorManager
• Provide day-to-day
management & oversight
Provide guidance &
direction to project
resources
Provide status updates
to leadership
Identify, manage &
resolve issues, risks
CoreTeam
Manager&Consultants
• Executes & delivers work
across respective project
thread
Leverages & works side
by side with resources of
ECD
SKILL SET LIST
Consultant Name
Experience
(yrs)
InfoSec Experience
(Yrs)
Certifications (CISA/CISSP/CISM,
ISO27K1 LA/LI, etc)
Consultant 1 12+ 8+ CEH,MCSA,CCNA,ISMS LI,ITIL V3
Consultant 2 12+ 10+ CEH,CCNA,ISMS LA
Consultant 3 20+ 15+ CAIIB,CISA,CBCI,ISO 27001,ISO 22301
Consultant 4 2+ 2+
CEH,Hackers school
certification,Android
Hacking Expert
Consultant 5 9 9 ISMS LA,CCNA,
Consultant 6 3+ 3+ CEH, OSCE,OSCP
1 von 39

Recomendados

Cyber security infotech pvt ltd von
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber Security Infotech
298 views21 Folien
Scalar_Managed_Security_Services_2016 von
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
244 views4 Folien
PCI DSS v3.0: How to Adapt Your Compliance Strategy von
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
4K views37 Folien
AL_PCI-Cheatsheet_web von
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webDerrick McBreairty
228 views5 Folien
Pöyry ICS Cyber Security brochure (English) von
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
297 views3 Folien
Managed Security Services from Symantec von
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
22.3K views19 Folien

Más contenido relacionado

Was ist angesagt?

Aujas Cyber Security von
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber SecurityVivianMarcello3
153 views5 Folien
AURISEG CONSULTING PRIVATE LIMITED von
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED Srinivasan M.S
459 views6 Folien
Practical Enterprise Security Architecture von
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
2.4K views48 Folien
DTS Solution - Cyber Security Services Portfolio von
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
3.1K views14 Folien
Risk based it auditing for non it auditors (basics of it auditing) final 12 von
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Thilak Pathirage -Senior IT Gov and Risk Consultant
285 views1 Folie
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) von
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
597 views21 Folien

Was ist angesagt?(20)

AURISEG CONSULTING PRIVATE LIMITED von Srinivasan M.S
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
Srinivasan M.S459 views
Practical Enterprise Security Architecture von Priyanka Aash
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash2.4K views
DTS Solution - Cyber Security Services Portfolio von Shah Sheikh
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh3.1K views
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) von Shah Sheikh
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh597 views
Cryptika cybersecurity - company profile von Safwan Talab
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profile
Safwan Talab878 views
PCI DSS Implementation: A Five Step Guide von AlienVault
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
AlienVault3.2K views
Securing Your Cloud Applications von IBM Security
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
IBM Security3.1K views
Cloud Security: Limitations of Cloud Security Groups and Flow Logs von Priyanka Aash
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash1.8K views
CV of Mohan M von Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
Mohan M1.1K views
Certified Information Systems Security Professional (cissp) Domain “access co... von master student
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
master student3.6K views
Assessing the Security of Cloud SaaS Solutions von Digital Bond
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
Digital Bond5.2K views
Mindtree distributed agile journey and guiding principles von Mindtree Ltd.
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
Mindtree Ltd. 704 views

Similar a CyberKnight capabilties

It security cognic_systems von
It security cognic_systemsIt security cognic_systems
It security cognic_systemsCognic Systems Pvt Ltd
303 views13 Folien
Security is our duty and we shall deliver it - White Paper von
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
353 views7 Folien
CYBER-i Corporate Dossier von
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
225 views9 Folien
Advanced IT and Cyber Security for Your Business von
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
859 views24 Folien
Cyber security service portfolio of Future Data Ltd von
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
95 views4 Folien
Ooredoo%20Security%20Managed%20Services von
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
312 views7 Folien

Similar a CyberKnight capabilties(20)

Security is our duty and we shall deliver it - White Paper von Mohd Anwar Jamal Faiz
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Advanced IT and Cyber Security for Your Business von Infopulse
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse859 views
Cyber security service portfolio of Future Data Ltd von Sabrina Chan
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
Sabrina Chan95 views
Infopercept_Technology_Risk_Review von anjali bhalgama
Infopercept_Technology_Risk_ReviewInfopercept_Technology_Risk_Review
Infopercept_Technology_Risk_Review
anjali bhalgama126 views
Technical Security and Penetration Testing von IT Governance Ltd
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration Testing
IT Governance Ltd433 views
TSS - App Penetration Testing Services von Ahmad Sharaf
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
Ahmad Sharaf129 views
Security and Compliance In Microsoft Office 365 Whitepaper von David J Rosenthal
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
David J Rosenthal2.5K views
Cyber security audit, Cyber security audit services, Security audit.pdf von infosecbrigade1
Cyber security audit, Cyber security audit services, Security audit.pdfCyber security audit, Cyber security audit services, Security audit.pdf
Cyber security audit, Cyber security audit services, Security audit.pdf
infosecbrigade12 views
Cyber security audit, Cyber security audit services, Security audit.docx von infosecbrigade1
Cyber security audit, Cyber security audit services, Security audit.docxCyber security audit, Cyber security audit services, Security audit.docx
Cyber security audit, Cyber security audit services, Security audit.docx
infosecbrigade13 views
Starting your Career in Information Security von Ahmed Sayed-
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-326 views
Scalar Security Roadshow: Toronto Presentation - April 15, 2015 von Scalar Decisions
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions965 views
IT SECURITY ASSESSMENT PROPOSAL von CYBER SENSE
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE12.1K views
SecArmour Security Group von Sec Armour
SecArmour Security GroupSecArmour Security Group
SecArmour Security Group
Sec Armour630 views

Último

Business Analyst Series 2023 - Week 4 Session 7 von
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
110 views31 Folien
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
105 views15 Folien
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
97 views28 Folien
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ von
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
58 views9 Folien
Microsoft Power Platform.pptx von
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
74 views38 Folien
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
48 views17 Folien

Último(20)

Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10110 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue105 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ von ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 views
The Role of Patterns in the Era of Large Language Models von Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li74 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue128 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue121 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... von ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... von ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue69 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T von ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue81 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue149 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
DRBD Deep Dive - Philipp Reisner - LINBIT von ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue110 views

CyberKnight capabilties

  • 1. CYBER KNIGHT Primary Contact Ms Rama +85368814100 rs@icyberknight.com Secondary Contact Mr Chetan Singh +918527296800 cs@icyberknight.com
  • 2. Overview Cyber Knight is one of The leading IT Security firms specializing in providing Enterprise Risk Services and Defensive Security Services. We has a proven track record of assisting numerous global organizations obtain and maintain desired levels of online security. Enterprise Risk Services (ERS) Include ▌ IS/IT Audit & Compliance ▌ Managed Security Services (SOC/NOC) ▌ Risk & Incident Management Services ▌ Information Security Framework ▌ Information Security Governance ▌ Detailed Cyber Risk Assessment and Treatment ▌ Information Security Training (Awareness/Secure Coding) ▌ Performance Testing and Bench mark services ▌ Penetration Testing ▌ Cyber Attack Simulations ▌ Intruder Attack Simulation ▌ Internal Penetration Testing ▌ Information Security framework Built-Operate-Transfer Model
  • 3. Overview Cyber Knight provides a unique portfolio in the field of cyber investigation, to address modern challenges with the utmost efficiency with leading defensive digital intrusion solutions. Defensive Security Services (DSS) Include ▌ Cyber Attack Response Simulation ▌ Cyber Attack Response plan and Drills ▌ Competitive Intelligence Gathering ▌ Social Engineering Awareness Trainings ▌ Cyber Security framework Built-Operate- Transfer Model ▌ Defensive Security Training for Developers. ▌ Passive and Active Investigative Services ▌ Vulnerability Research & Support ▌ Internal Cyber Security Operation Center plan and setup ▌ Cyber Security Management
  • 4. Overview Cyber Knight provides a unique portfolio in the field of Managed Security Services, to address Security Operational challenges with the utmost efficiency with rich experience in managed security services. Managed Security Services (MSS) Include ▌ Security Event Management& Incident Response ▌ Managed Web Defense ▌ Managed Security Controls ▌ Managed Security Analysis ▌ Managed GRC Automation ▌ Managed Remediation ▌ Security Process Management ▌ Security Process Support Desks
  • 6. Cyber Knight Cyber Knight, through its experience and industry relationships, presents compelling value to customers ▌ Extensive experience in strategy development ▌ Deeper understanding in industry segments ▌ Existing relationships with leaders across verticals ▌ Domain Expertise across the required verticals DOMAIN EXPERTISE BUSINESS INSIGHT INDUSTRY LINKS INDUSTRY KNOWLEDGE
  • 7. • Examination of the management controls within an Information technology (IT) infrastructure IS/IT Audit & Compliance • Identifying, quantifying, and prioritizing (or ranking) the found vulnerabilities Penetration Testing • Systematic approach to managing an organization's security needs Managed Security Services • An unplanned interruption to an IT Service or a reduction in the Quality of an IT Service Risk & Incident Management • Advanced and specialized information security training for infosec professionals Information Security Training • Used to determine the speed or effectiveness of a computer, network, software program or device Performance Testing & Benchmark services Our ERS Services
  • 8. IS/IT Audit and Compliance
  • 9. IS/IT Audit and Compliance Evaluates controls related to the organizations information processing systems. IT/IS audits includes and assessment of data, networks, hardware, applications, databases, servers, contracts, software/hardware licensing, security, business continuity, access authorization and compliance with organizations policies and procedures.
  • 12. • Authentication Management • Safe Browsing • Cyber Intelligence • Data Leakage Prevention and Forensic Suite • Domain Name Services • Governance Risk and Compliance • Malware Management • Security for Endpoints • Social Media and Brand Protection • The Human Firewall
  • 13. “We Do Authentication, You Do Your Business As Usual” Our Authentication Management Solution Our Authentication Management deploys world leading client recognition and access management systems. They are able to secure billions of users accounts. Our authentication solution and access control provides solutions which are changing the way businesses interact and authenticate their users which is done remotely. Our solution is simple to deploy and it conforms to respect your organisations privacy, security standards and compliance requirements. Keys to Our Authentication Management Easy Onboarding We offer you easy digital enrolment experiences which are spread across our service applications and delivery channels. Adaptive Authentication When using our easy cost effective technology you will receive trustable identity validations & multi factor authentication with lesser effort than typing a password. Unified Access Management Make use of all our features through a developer-friendly Rest API. This is our single solution for all your authentication needs. Why Choose our Authentication Management We offer you a system which is: Secure Convenient Multimodal Compliant Integrate Scalable Future-proof Provisioned Authentication Management
  • 14. Most of the threats and attacks that appear on our devices come from the web after sneaking pass the security measures which we enabled. Our solution allows users to safely browse the Internet without having the fear of getting compromised. Our solution augments existing defenses to keep malware and zero-day exploits off all endpoints. What is Safe Browsing: Executes active web content in a remote disposable container Makes websites a safe interactive content stream Delivers natural browsing experience for users Browse with Confidence Users can click without the fear of data exploits, ransomware, malware attacks and other threats Integrated file sanitization for safe downloads It increases productivity How Our Solution Keeps Malware Out Our solution does not require installation and does not interrupt the work flow. Below you will see how our solution works: A user opens up a browser Our tool instantly powers up a virtual browser in a remote Linux container The website’s code executes in the virtual browser which is nowhere near to the end users device To prevent leakage of sensitive data between sessions, each browser session or tab gets its very own isolated container. When a session is closed or inactive, the container is destroyed, along with any malicious code Files which are downloaded are scanned and cleansed using the pre-integrated sanitization tool before they’re released to the user Safe Browsing
  • 15. Cyber Intelligence detects and helps investigate external and insider threats across on-premises, cloud and hybrid environments. Our solution is built to support the most demanding workloads of security analytics for the modern enterprise. Our solution fuses together unique machine learning algorithms, world-class security research and in depth critical security data. It will help protect you from both known and unknown attacks by detecting threats early. Detection By use of our solution, we will detect malicious activity by collecting multiple data sources, network traffic, event logs, VPN data, and much more to create a coherent behavioural profile. Cyber Intelligence comes with a set of deterministic models that identify both common and newly discovered implementations of attacker techniques such as Pass-the-Hash, Overpass-the-Hash, Golden Ticket and other techniques. Prevention & Isolation Our solution shows the attack as a contextual alert timeline, where each individual alert includes both description of the malicious activity that triggered it, as well as the required onward response steps which should be taken. Our solution provides alerting and profiling information on malicious activity with the tools and metadata that are required for further investigation. Cyber Intelligence
  • 16. Our solution helps your organisation from intentional or accidental insider threats. Our solution provides you with analytics which provides you with actionable context & intelligence. It can be deployed on your system without timeouts. From installation our tool will start protecting your organisation from data leakages immediately. By using our solution you have overall control of all the secrets that within your company. What our solution provides you? • Control of confidential documents • Control data channels • Detect unauthorized actions of employees & stop them • User visibility • Patterns of known behaviour • User behaviour intelligence Our Solution Puts An End To: • Data Exfiltration • IP Theft • Credential Misuse • Credential Theft • Account Takeover • & Much More More Than Just Our DLP Solution • Our DLP Solution has a Forensic Suite integrated into it and provides more capabilities: • Control not only data, but human behaviour as well • Perform audit of all corporate processes • Detect suspicious actions of employees • Investigate and collect evidence • Prevent thefts and other types of corporate fraud Data Leakage Prevention and Forensic Suite
  • 17. Security, reliability, performance. The reasons your business can count on us to secure this cornerstone of your connected world. Just what you want in your DNS. Functions of our DNS Our DNS comes in two categories: Authoritative DNS Enterprise Our DNS is an enterprise grade, managed authoritative DNS service that ensures 100% website availability along with built-in security for superior protection. Small Business Our DNS also offers packages for small to medium sized businesses to manage their DNS needs. Recursive DNS Enterprise Our Recursive DNS is an enterprise grade, cloud-based recursive DNS service that delivers fast and reliable access to vital online applications with built-in security and threat intelligence. Small Business We also offer a Recursive DNS service that enables users, families and small businesses to experience a faster and safer online experience. Domain Name Services
  • 18. ur solution offers a time saving, web based service which is designed to help an organisation manage their governance, risk and compliance. It utilises of a self- service concept and management by exception. This ensures that time is not wasted on tasks which are not necessary. Key Advantages: • Improved Information Governance coordination – Dramatically increase the Information Governance coordination within your organisation • Better Information Governance visibility – Provide your management and all staff with visual dashboards showing the state of operational compliance • Greater Information Governance efficiency – Boost operational efficiency by providing automated processes that simplify key tasks making compliance easier to achieve Furthermore we have detailed risk courses for: • Employees who decide to quit their job and then causing jeopardy in the work flow • Employees causing inside attacks • Employees who snoop around and choosing to make extra money on the side using organisation’s material • Employees creating a fraud scheme • Leaking commercial secrets due to blackmail and deliberate sabotage. We have the perfect package to suit your organisation with regards to employee profiling and behavioural patterns, these packages are broken down into: • Guide on risk group control • Guide on how to protect against fraudsters inside a company • Guide on how to control human behaviour • Data Protection Courses • GRC-ISMS Courses Governance Risk and Compliance
  • 19. Our Malware Management is an easy to use business security solution, which delivers superior proactive protection from viruses, spyware, rootkits, spam, phishing and other malware. Functions of our Malware Management Our Malware Management Solution allows you to create centralized reports on the security status of your networked or stand-alone computers. We offer security which allows you to have a full range of both virtualised and physical environments: • Identifying network security issues, threats and vulnerabilities. • Monitoring and ensuring compliance with the organization’s security policies. • Checking and assessing the network security status. • Monitoring security incidents and malware activity. • Providing upper management with easy-to-interpret data on network security. • Next Generation Firewall (combination of enterprise class firewalling with application recognition) • Virtual Next Generation Firewall (runs on private, public and hybrid clouds) Malware Management
  • 20. Our Endpoint Solution provides you with the only platform that defends every endpoint against all types of attacks, including Ransomware! Our solution is a signature-less which means no daily or weekly updates. Protect What Matters Our solution has machine learning & AI applied to it hence our platform does not need prior knowledge of an attack. The threat landscape is always evolving but our platform is ready to stop attacks that have not yet been released. With our platform you are free to use your technology as you please. Our Endpoint Protection Warranty We stand behind our solution and with our valued customers. We offer you up to $1 Million in ransomware protection. Think smart and get the assurance of security with our Endpoint Protection Solution. Security for Endpoints
  • 22. Managed Security Services Managed Security Services(MSS) are network security services that have been outsourced to a service provider. Managed Security Services (MSS) is a systematic approach to managing an organization's security needs. On-site consulting: This is customized assistance in the assessment of business risks, key business requirements for security and the development of security policies and processes. Consulting may also include security product integration and On-site incident response and forensics. Remote perimeter management: This service installs and upgrades the firewall,Virtual Private Network(VPN) and intrusion detection hardware and software, commonly performing configuration changes on behalf of the customer Managed security monitoring: This is the day-to-day monitoring and interpretation of important system events throughout the network, including unauthorized behavior, malicious hacks and denials of service (Dos), anomalies and trend analysis. It is the first step in an incident response process. Penetration and vulnerability testing: This includes one-time or periodic software scans or hacking attempts in order to find vulnerabilities in a technical and logical perimeter. It generally does not assess security throughout the network, nor does it accurately reflect personnel-related exposures due to disgruntled employees, social engineering, etc. Compliance monitoring: This includes monitoring event logs not for intrusions, but change management. This service will identify changes to a system that violate a formal security policy for example, if a rogue administrator grants himself or herself too much access to a system. In short, it measures compliance to a technical risk model. five categories of managed security services
  • 23. • Green Services • Maturity Assessment • Cyber Governance • Malware Management • Blues Services • Maturity Assessment • Cyber Governance • Malware Management • Cyber Threat Intelligence • Bronze Services • Maturity Assessment • Cyber Governance • Malware Management • Cyber Threat Intelligence • Cyber Security Awareness • Silver services • Maturity Assessment • Cyber Governance • Malware Management • Cyber Threat Intelligence • Cyber Security Awareness • Cyber Security Technology Controls • Digital Forensics • Platinum Services • Maturity Assessment • Cyber Governance • Malware Management • Cyber Threat Intelligence • Cyber Security Awareness • Cyber Security Technology Controls • Digital Forensics • Online Brand and Social Media Policing • Value Added Services Offerings
  • 24. 24 x 7 monitoring 24 x 7 Alerts & Advisories Compliance Administration Audit & reporting Forensics Vulnerability Management Incident management Change management Configuration management Managed Security Services
  • 25. Cyber Attackers are Creative and Smart
  • 27. The Attack Surface has Grown
  • 29. Are Fundamental Questions been Addressed? • What is that you are Protecting? • What are you protecting yourself from? • How do you Prioritize? And how often do you prioritize? • How do you check that your efforts are effective?
  • 30. Our Offerings ▌ Managed Firewall ▌ Managed SIEM ▌ Managed Two Factor Authentication ▌ Managed Updates and Patches ▌ Email and Web Filtering ▌ Managed Anti-Malware Protection ▌ Data Protection and Recovery ▌ Security Reporting and Dashboard ▌ Endpoint Protection ▌ Rapid Response
  • 31. Why Cyber Knight? End to End + Multi Layer = Complete CKPL
  • 33. Defensive services Systems & Networks Hardening Endpoint Security Continuous event log monitoring from endpoints and security devices Audit of Infrastructure and Remote Access Methods Counter Intelligence Services
  • 34. INFORMATION GATHERING PROCESS & COLLATION OF INFORMATION INTELLIGENCE ANALYSIS & PRODUCTION INTELLIGENCE INFORMATION DISSEMINATION REEVALUATION PLANNING & DIRECTION, TARGET AND OJECTIVE DEFINITION Intelligence Gathering
  • 35. PASSIVE INTELLIGENCE GATHERING 35 • Search Engines and File sharing • People Search • Social Networking • Whois Record • Criminal Record • Reverse Phone Lookup • Job Listing • Online Public Record • Public Disclosures • Darkweb Commerce Search
  • 36. Types Of Data Collected Network Block, IP information, IP Location Make & Model of ADSL / Wireless / 4G Router Desktop/Laptop/Mobile Device OS information / Browsers, Mobile Provider Information including Roaming details, IMSI, Porting Data Trace Of Published Stolen Records From In-depth Internet Search Identification DOf People ealing With IPR Theft Date And Timestamp Of IP Darkweb Sale Records (From Blockchains)
  • 37. Incident Response Management Incident Reporting Evaluating, correlating & Prioritizing each report Investigating each report or set of related reports Provider reviewing reports of suspicious system & network behavior & events Intrusion Detection Intrusion Response Audit Endpoint and Event Logs Performing forensic analysis Preserving the evidence Recommending improvement actions
  • 38. Proposed Team Structure We propose a team structure, which would ensure reviews and quality check at multiple levels SteeringCommittee Partner/Director • Responsible for owning & delivering project to broader organization Provides direction & alignment between project, organization & activities ProjectManagementteam SeniorManager • Provide day-to-day management & oversight Provide guidance & direction to project resources Provide status updates to leadership Identify, manage & resolve issues, risks CoreTeam Manager&Consultants • Executes & delivers work across respective project thread Leverages & works side by side with resources of ECD
  • 39. SKILL SET LIST Consultant Name Experience (yrs) InfoSec Experience (Yrs) Certifications (CISA/CISSP/CISM, ISO27K1 LA/LI, etc) Consultant 1 12+ 8+ CEH,MCSA,CCNA,ISMS LI,ITIL V3 Consultant 2 12+ 10+ CEH,CCNA,ISMS LA Consultant 3 20+ 15+ CAIIB,CISA,CBCI,ISO 27001,ISO 22301 Consultant 4 2+ 2+ CEH,Hackers school certification,Android Hacking Expert Consultant 5 9 9 ISMS LA,CCNA, Consultant 6 3+ 3+ CEH, OSCE,OSCP

Hinweis der Redaktion

  1. Maturity Assessments We test your environment: a. External Penertration Testing b. Internal Penertration Testing c. Vulnerability Assessments d. Software Code Reviews e. People Awareness Assessments f. Architecture Reviews g. Governance Reviews Benefits to your organisation: a. Helps to evaluate security investment b. Testing your current Cyber Security Defence c. Visualise the weakness in your environment before an incident takes place Cyber Governance framework We develop and maintain your: a. Policies b. Standards c. Procedures d. Strategy e. Enterprise information architecture Benefits to your organisation include: a. Compliance with local and international legislation b. Alignment with international best practices c. Classification of information Malware Management Service On your Technology Infrastructure, we implement and maintain:   a. Centrally managed host based firewalls b.Centrally managed host based intrusion prevention solution c. Centrally managed enterprise wide antivirus and anti-spyware   Benefits to your organisation include:   a. Removes an prevents known Malware from executing b. Protects against new and unknown malware (zero-day exploits) c. Keep your organisation resistant to the daily influx of malware Cyber Intelligence Service We provide the following 24×7 monitoring service that identifies threats aimed at your organisation:   a. Threat Analytics b. Device Analytics c. Incident Management Benefits to your organisation include:   a. Understanding the objective of the threat actor. b. Evidence based knowledge about an existing or emerging threat. c. Condition under which a threat is likely to exploit a vulnerability. Cyber Security Awareness Our Cyber security awareness service offers the following:   a. Onsite Workshop Awareness Session b. Automated Technology Awareness Sessions   Benefits to your organisation include:   a. Being informed creates a better workplace culture. b. Staff will become more confident with regards to using technology c. A conductive culture saves your organisation money. Cyber Security Technology Controls Our Cyber Security technology tools include:    a. Data Compression & Encryption b. Domain Name Service (DNS) management c. Enterprise Certificate Management d. Data Leakage Protection e. Ransomware blocker f. Email Mail regulator g. Secure hardware h. Custom Developed Security Technology Tool for your needs   Benefits include:   a. Security-centred device management b. Minimise security vulnerabilities and monitor protected systems c. Preventing targeted phishing attacks from reaching your business Digital Forensics Preserving evidence while performing an investigation, Our service includes:   a. Network forensics b. Firewall forensics c. Database forensics d. Mobile device forensics   Our digital forensics service benefits include:   a. The comparison of relevant types of data from different systems or sources to show a more complete picture b. The ability to easily trend relevant data over periods of time; fluctuation in trending lines can be analysed further for false positives and potential risk factors. c. The quick identification and extraction of certain risk criteria from the entire data population for further analysis. d. The testing for effectiveness of the control environment and policies in place by identifying attributes that violates rules. e. Identifying trends of which company personnel, consultants and forensic accountants were unaware off. Online Branding and Social Media Policing Providing a policing service protects your brand online, our services include:   a. Monitoring of databases to detect attempts to register the same or similar trademark. b. Comprehensive third party monitoring for any infringing commercial use of your mark. c. Safeguarding your brand to remain in compliance with trademark laws and regulations.   Benefits include:   a. You stay informed and up to date on the status of your trademark b. Preventing the possibility of consumer confusion and unfair competition c. Let infringes know that you are serious about maintaining your trademark