The Cybersecurity Package is the ultimate one-stop source for technical knowledge, guidance, and best practices on cybersecurity, pulling together the latest standards and reference works from the world’s most respected publishers and leading authorities.
Frequently asked questions
What are the different CyberSecurity Packages?
The different packages are:
What is the deliverable for the 'Identify' package?
What is the deliverable for the 'Mitigate' package?
Establish Identity Management and Access Control within the organization
Provide Awareness and Training including role based and privileged user training
Implement Data Security
Implement Processes and Procedures to secure information systems
Setup a process to detect Anomalies and Security Events
What is the deliverable for the 'Monitor' package?
Continously monitor the health of your security controls and take the necessary actions if a security breach attempt is detected.
Why do I need the CyberSecurity packages?
Security is only as strong as your weakest link. The packages take a holistic approach to security to build defenses for all attack patterns.
What tools do you use to deliver the packages?
No one solution fits all. We are vendor agnostic and adopt technology and processes that fits well with your infrastructure.
Workflow for CyberSecurity Package
Review Security for user accounts, service accounts and administrator accounts.
Review Network Security for both private and public networks
Review your Security Architecture Stack to ensure that necessary detective and preventive controls are in place
Review Email Security to mitigate the risk of phishing
Review security of your website by conducting penetration testing
Ensure that Anti-Virus solutions have been properly implemented on all workstations and servers
Ensure Backups and Incident Response procedures are in place to counter ransomware and intrusion attempts
Build a process for Continuous Monitoring and Alerting against potentially malicious activities.