Services

Penetration Tests & Vulnerability Assessments

A successful cyber security strategy relies on thorough, reliable, and accurate vulnerability assessments. The PTVA service offers a comprehensive report and finding register based on a combination of automated, manual, and field-tested methodologies. The reports provide a detailed view of your organization's vulnerability landscape, including a description of each finding, all affected hosts, and suggested mitigations based on industry best practices.

The service meets any regulatory requirements for an independent or third-party vulnerability assessment or penetration test, and attestation letters can be provided upon request.

Red Team Exercises

This service is designed for organizations with a mature security program in place, or mission critical systems, services & data assets. The assessment typically takes between 3 to 6 months, during which I use every reasonable methodology of a persistent attacker to breach digital defenses. The scope of the assessment is typically unrestricted, meaning that I will have the same level of access and knowledge as an anonymous but dedicated attacker.

The final report will include a list of methodologies used, results, and, in case of a successful breach, a narrative of the attack path and logic.

Incident Response Planning

The incident response planning service helps small to medium organizations and freelance professionals develop a comprehensive plan to respond to cybersecurity incidents effectively. We’ll work closely to identify key roles, responsibilities, and procedures that should be followed in the event of an attack. Tailored plans also include communication strategies, containment tactics, and recovery procedures, ensuring minimized downtime and reduce the business and brand impact of a security breach.

OSINT Investigations

The pervasive nature of the internet is a significant concern for businesses. Open Source Intelligence (OSINT) is a vital tool for proactively identifying any information that may be exploited by bad actors against individuals, organizations, or brands. OSINT goes beyond merely scouring publicly available online sources, encompassing deep-web searches, analysis of past and present data breaches, password dumps, code repositories, and hidden forums hosted on platforms like Telegram or Discord. This comprehensive approach leverages all available resources, potentially bringing to light valuable insights critical for effective risk management.

Phishing Exercises

The phishing assessment service is aimed at SMBs and Non-Profit Organizations, it evaluates the organization's susceptibility to phishing attacks by simulating realistic phishing campaigns. The system uses tried and true templates, but if requested we’ll design custom phishing emails, webpages, and other social engineering tactics tailored to your organization's context to identify potential areas of risk. Our comprehensive report includes an analysis of employee response rates, potential vulnerabilities (if uncovered), and recommendations for training and security enhancements to help you mitigate the risk of phishing attacks and protect your sensitive data.

Customized Security Awareness Training

The program is designed to address your organization's unique potential areas of risk. We work closely with you to identify and define specific vulnerabilities and threats. Leveraging on trusted collaborators, we create training materials that are tailored specifically for your organization’s needs. The training sessions cover topics such as phishing, social engineering, password management, and data protection, all with a focus on the real-world risks your organization faces. By providing bespoke training, we empower you and your collaborators to recognize and mitigate threats, ultimately improving your organization's overall security posture.