Assisting in Litigations, IT Audits and Breach Remediation

Infrastructure Analysis, Expert Witness Testimony, and Network Resiliency

Services

Lets us help harden your defense-in-depth strategy while you continue to be extraordinary

Digital Forensic assessments can evaluate fundamental security necessities such as confidentiality and integrity as well as the principals and frameworks that support them.

white concrete building

Exploitation and Target infrastructure Analysis

Vulnerability Assessment

Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Conduct and/or support authorized penetration testing on enterprise network and data infrastructure (e.g., exploitation of existing new or updated applications).

Monitor target networks to provide indications and warning of target communications changes or processing failures. Report intelligence-derived significant network events and intrusions.

Provide awareness of advancements in hardware and software technologies and their use cases potential implications

Apply and utilize authorized cyber capabilities to enable access to targeted networks. Perform analysis for target infrastructure and exploitation activities to discover exploitable vulnerabilities

white concrete building

Proactive Risk Mitigation, Resiliency & Fault Tolerance

IT Audit Assistance

Create, edit, and manage network access control lists on specialized defense systems (e.g., firewalls and IPS).

Prepare assessment reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. Playbook templates and guidance

Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization). Serve as an expert to assist in IT audits.

Apply specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or VPN devices, to include installation, configuration, maintenance, backup, and restoration.

Evaluate and Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, content blacklists, lockouts, and access control list) for specialized cyber defense applications.

white concrete building

Expert Witness and Breach Remediation

Expert Witness/Assisting in court proceedings

Perform Malware, file system, timeline and registry analysis. Perform hash comparison against established database.

Track and document cyber defense incidents from initial detection through final resolution to provide Detailed Incident, forensic reports and root cause analysis.

Analyzing and Reporting incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation techniques). 

Conduct multi-attack incident triage, to determine scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations to expeditious remediation.

Create forensically sound images for analysis and timeline recreation. Serve as technical expert and explain incident details as required.

Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection logs) to identify critical threats to network security.

GORDON.

Let us help you secure your networks while you lead in innovation.