11

Welcome to Vulsec Remote Security Appliance

Embed Size (px)

Citation preview

Page 1: Welcome to Vulsec Remote Security Appliance
Page 2: Welcome to Vulsec Remote Security Appliance

About Us• Vulsec’s security experts deliver versatile tactics

tailored to arm your IT department in the fight against hackers.

• We assess your organization to uncover the risks threatening your data, and the shortcomings of your Information Security Program (ISP).

• Vulsec’s accomplished team is equipped to provide you with their unsurpassed skills in the fields of:• Social Engineering, Penetration Testing,

Simulated Attacks, Mobile Device Risk Assessments, and Enterprise Risk Assessments.

• Our satisfied client list includes: Financial Institutes, Power Plants, Hospitals, Casinos, Restaurants, Hotels, Grocery Stores, and Retail Chains.

Page 3: Welcome to Vulsec Remote Security Appliance

Our PartnersVulsec created a partnership network to introduce industry leading cyber security initiatives. We transform your IT department into a state-of-the-art defense mechanism to combat hackers.

We make unbiased, vendor neutral recommendations and provide exclusive access to our vetted partner network. Our promise is to find the data and protect the data.

Our clients are able to acknowledge an attack, mitigate an attack, and remedy vulnerabilities to keep critical assets safe.

Page 4: Welcome to Vulsec Remote Security Appliance

In The News• “Small businesses can’t afford to keep their head in the sand and think that hacking is only a problem the big companies

face. All businesses need to understand their vulnerabilities, and realize that what they may not know now can have an incredibly detrimental impact later….” – Small Business Opportunities December 7th, 2015• http://www.sbomag.com/2015/12/how-to-avoid-getting-hacked/

• “Big companies “should” have the resources to realize, relatively quickly, when a security breach has occurred. However, these infrastructures are complex because secure architectural engineering has not happened before growth….”– Boston CityBizList November 2nd, 2015• http://boston.citybizlist.com/article/311580/interview-with-andrew-ostashen-vulsec-llc

• “Most employees are not properly trained in the subject of identifying threats to the company infrastructure, or how to respond to them. Given the numerous techniques a hacker could employ – from rummaging through a dumpster to collect improperly discarded documents to showing up at a place of business as a contracted technical employee and gaining access to the main servers – comprehensive educational programs that train employees in detecting and responding to hacking threats are imperative….” – Banker and Tradesman October 26th, 2015 • http://www.bankerandtradesman.com/2015/10/yes-it-can-happen-to-you/

Page 5: Welcome to Vulsec Remote Security Appliance

The Security Life Cycle

Vulsec’s Security Life Cycle (SLC) was meticulously designed to be customizable for all industries in order to successfully find the data and protect the data.

Page 6: Welcome to Vulsec Remote Security Appliance

Phase 1• Enterprise Risk Assessment

• What are the risks associated with the flow of data in the organization? • Vulnerability Management

• Continuous Vulnerability Security Assessment.• External Network Security Assessment

• Can the outside world get into the organization’s corporate network?

• Remote Social Engineering (Social Media Recon, Email and Phone Calls) • Are employees giving out sensitive information?• Managed phishing service.

• Physical Security Assessment• Is the data center and data secure from unauthorized users?

• Wireless Security Assessment• Are guest wireless users able to access the corporate network?

• Mobile Device Risk Assessment• Is there corporate data going throughout employee’s mobile devices?

Page 7: Welcome to Vulsec Remote Security Appliance

Phase 2 • Internal Penetration Testing

• Is my organization able to determine if we are breached?

• External Penetration Testing• Is an attacker able to breach perimeter security to access the corporate network?

• Spear Phishing• What would happen if an employee downloaded a malicious attachment? • Are the organization’s employees aware of phishing tactics?

• Physical Social Engineering• Can an unauthorized user breach the organization’s buildings perimeter security?• Is the organization’s data center safe from a physical breach?

• Wireless Penetration Testing• Can an attacker utilize a broadcasted wireless network to gain access to the corporate network?• Does the organization’s ‘Bring Your Own Device’ BYOD policy increase the organization’s risk of data

compromise?

• Mobile Device Penetration Testing• Vulsec will drop malicious QR codes, send corrupt SMS messages, and have users install deceptive mobile

applications.

Page 8: Welcome to Vulsec Remote Security Appliance

Phase 3 • Simulated Attack

• Vulsec will perform a series of attacks that simulate real world scenarios. This allows the organization to practice how to acknowledge an attack, mitigate an attack, and remediate the vulnerabilities.

• This is similar to a ‘Capture the Flag’ scenario with your organization. Vulsec is trying to find data through simulated attacks while your IT department is defending the infrastructure.

• Threat Simulation• Vulsec will setup hand-crafted scenarios for your organization based on your goals.

• Assess security levels of corporate access with VPN credentials.• Installation of malware on employee workstation.• Standard user credentials provided to test privilege escalation.

Page 9: Welcome to Vulsec Remote Security Appliance

NicheServices

• Cyber Security Due-Diligence• Is the organization you are acquiring have their intellectual property breached? • Does malware have a foothold within the organization?

• Point of Sale (PoS) Risk Assessment • Can your PoS network be breached from within the internal network?• Are your PoS terminals susceptible to a breach?

• Medical Device Risk Assessment• Are the medical devices deployed throughout the infrastructure leaving your organization at

risk?• Where are the medical devices located throughout the infrastructure?

• Casino Gaming Network Risk Assessment• Is your casino designing a new game room or building a new casino?• Vulsec can simulate your entire network to conduct assessments against a mirrored copy.

Page 10: Welcome to Vulsec Remote Security Appliance

Vulsec RemoteSecurityAppliance- VRSAVulsec hasdeveloped aRemoteSecurityAppliance(VRSA)thatcanbeshippedandutilizedforon-demandassessments.

Thisoptionsavesourclients$$byproviding personalizedservicewithzeroengineer travelexpenses.

Purchasehoursorprojectsinadvanceforon-demandassessmentsthrough ourVRSA.

• VirtualEnvironmentRiskAssessment• ITPolicesandComplianceAssessment• PII(Personally IdentifiableInformation) GapAnalysis• System/NetworkSecureImageHardeningAssessment• Phishing CampaigningandUserAwarenessTraining• OrganizationalMalwareHealthCheck• SensitiveDataIdentificationMechanism

Page 11: Welcome to Vulsec Remote Security Appliance

Thank You & Contact Us!

• Address: 30 Newbury St, Boston, MA 02116• Telephone: 617-648-9815• Fax: 617-648-9819• Email: [email protected]• Linkedin Vulsec• Linkedin Andrew Ostashen• Facebook• Twitter• www.vulsec.com