Loading...
Home2020-11-18T16:35:51+00:00
Digital Forensics Risk Assessment Gap Analysis IT Audit Pen-Testing Incident Response

The Mission

identify

Identify

  • Identify all assets
  • Identify all business flows
  • Identify all roles
  • Identify the accepted risk for each
  • Create and enforce and Incident Response Plan
protect

Protect

  • Protect all discovered assets
  • Protect all discovered business flows
  • Protect all discovered roles
  • Create policies and procedures for each asset
  • Create and enforce an Incident Response Plan
detect

Detect

  • Detect all cyber security events
  • Detect changes in business flows
  • Detect changes in roles
  • Change policies and technologies as needed
respond

Respond

  • Respond to every event in a timely manner
  • Isolate any detected threats
  • Manage the crisis and preserve the evidence
respond

Recover

  • Recover from events or breach
  • Perform investigations to identify and protect
  • Change your policies to identify and protect