Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
PATHFINDERS INCYBERINTELLIGENCE_
CYBER CAPACITY BUILDING | OFFENSIVE SECURITY | INCIDENT RESPONSE | HUMAN CAPABILITY
We are in the informationage; the freedom of everycountry and organisation to
prosper is dependent upon resilientand secure digital technology. Throughdecades of experience, we understandthe critical interdependencies betweenindividuals, teams, organisations,nations and the enabling informationtechnology which stitches everythingand everyone together. The impact of
WE SECURE FREEDOM FORORGANISATIONS ACROSS THEGLOBE ENABLING THEM TOOPERATE AND EVOLVEWITHOUT FEAR.
We combine our unparalleled cyber expertise with ourexpeditionary capabilities to equip organisations toprotect themselves from cyber harm.
technology around the world is complex resulting in unique risk and opportunity pro-files across varied and dynamic socio-economic circumstances. This is our area of expertise; our team’s experience in cyber capacity building in the most complex and unstable parts of the world is unparalleled. We combine leader-ship and diplomacy skills with deep techni-cal knowledge to deliver capability that has impact and is sustainable.
Our team’s backgrounds range fromacademia to ex-military, many havingserved with central governmentdepartments in past careers. We don’t‘turn handles’ or ’tread water’, it’s notin our DNA. We are a global authorityin building cyber expertise and in 2019by invitation, CYSIAM was appointedas an Implementing Partner of theGFCE (Global Forum on Cyber Expertise)based in The Hague - www.thegfce.org.
We enable organisations and individuals to understand what they
need to know and do to operate and evolve in the digital age.
CYBER CAPACITY BUILDING
THE CYSIAMMATURITYMODEL
Our bespoke maturity modelenables our clients toachieve self-awarenessand improvement.
SECURITY & CONFIDENCE
The model prompts consideration of7 key focus areas alongsideassessing an organisation’sconfidence in its own understandingand abilities.
We use this model to discuss anddefine development pathways withclients to ensure that action plansare best suited to their individuallevel of maturity.
Every engagement is unique.
DESIGN DELIVER REVIEW
We build a bespokeprogramme of
activities to delivera step-change in
maturity.
We workcollaboratively withyou to develop yourtechnical and non-
technical capabilities.
We communicateoutcomes and
proposeappropriate futurematurity pathways.
MONITORING & EVALUATION
CYBER CAPACITY BUILDING
Supply Chain Governance
PhysicalEnvironment
Culture & Education
Data Handling
Policy
Technology
ASSESS
CYSIAM provides world-leading expertise in offensivesecurity and critical incident response. Using ourgovernment and military cyber expertise we train our clientsto be able to protect themselves and respond to attacksand breaches when they occur. Our team share afundamental desire to help people protect themselves, togive them the security and freedom to evolve.
SPECIALIST SERVICES
We are a CREST Certifiedcompany and work on projectsin the most critical parts of
government and public services. Wework with private sector organisationswhich recognise the threat to theirdata and operations and are ready to
invest intelligently in their ownsecurity and that of their clients.Across all our services we develop ourown tools, methodologies andframeworks in order to provide ourclients with the standard of results wewould be happy to receive ourselves.
OFFENSIVE SECURITYTest & Assure
Our highly deployable offensivesecurity team are experts in identifyingvulnerabilities and using thisinformation to build organisationalresilience. We are consultants first andforemost and communicate effectivelyand with clarity to our clients todevelop programmes that areappropriate for the threat andconsequences they face. We underpinall our services with current threat
modelling and intelligence analysiswhich ensures our clients fullyunderstand their risk profile within thecontext of their unique organisationand industry sector. Most importantly,we don’t treat security as an IT issue,our sophisticated approach works forboth a technical and non-technicalaudience; recognising that allstakeholders must be catered for, fromthe Support Desk to the Boardroom.
Vulnerability assessment & remediationPenetration testing (infrastructure & web app)Red teaming (simulated attack)
SPECIALIST SERVICES
INCIDENT RESPONSEDetect & Respond
Our monitoring, hunting and responseteams are powered by technology,intelligence and experience. We detectanomalous behaviour and work withour clients to prioritise and implementresponses in order to restore‘business-as-usual’ as quickly aspossible. For those attacks that aremore sophisticated and sustained, ourthreat hunting team track andimmobilise the threat, minimising
harm. If a breach is detected andemergency incident response required,our experts will be with you every stepof the way to ensure that you recoverquickly and completely. Our forensicinvestigation team will capture evidence, conduct root cause analysisand remove the threat.
Intelligence-led security monitoring & detectionProactive threat investigation (threat hunting)Emergency response & forensics team
HUMAN CAPABILITYTrain & Mentor
Security starts with people – from CTOto CEO and HR to IT, everyone has apart to play. We close the critical gapbetween our clients and theiradversaries by increasing theeffectiveness of organisationalresilience measures sustainablythrough exercise and experience-ledtraining. CYSIAM immersivedevelopment services evolve withevery engagement, continually
innovating to ensure relevance ismaintained within a notoriouslydynamic threat environment. Ourhybrid consultants are the Swiss armyknives of cyber and are our client’ssecret weapon to help them prosperand maintain their competitive edge inthe digital age.
Immersive exercises – Red v BlueBespoke objective-based trainingCoaching & mentoring
SPECIALIST SERVICES
OUR VALUES
These reflect what we stand for.They are the building blocks ofour culture, providing guidance,direction and support for ourcompany and everyone whoplays a role within it.
MASTERFUL
EXPEDITIONARY HONOURABLE
RESOLUTE
INTUITIVE
We are the elite incyber intelligence. Weare and will remain in
our own class.
We venture to everyhorizon in order tokeep our clients
safe.
We are reliable,principled and
discreet at all times.
Alert, ready andprotective, we don’t
miss a beat.
As threats evolve westay instinctive,
solution-orientatedand sure.
CYBER CAPACITY BUILDING
Humanity has evolved from cave-dwelling, wild hunting and fighting savage
neighbouring tribes. Today, we live in a world with infinite opportunities to thrive;
the world is at our fingertips.
However, throughout evolution one thing remains a constant; threat and attack.
And it’s no longer local, it’s global.
Protecting territory and freedom has never been more important.
Only the strongest and smartest tribes survive and thrive.