Solutions that address the fundamentals of foundational security components.
- Security strategy and business alignment
- Program and capability maturity
- Security architecture, solutions (SIEM, DLP, etc.)
- Identity and access management
- Security posture / training and awareness
Develop a new strategy and/or capabilities to combat cyber-threats.
- Cyber program transformation
- Threat intelligence fusion
- Advanced networking, monitoring and access
Incorporate cybersecurity into everyday business decisions and processes.
- Cyber due diligence
- Secure product and solution development (product lifecycle, distributed product engineering)
- Insider risk management
- Operational technology
React and respond
Respond, investigate and remediate cybersecurity related incidents and data breaches.
- Incident and crisis response
- Breach remediation
- Forensic investigations
- Third party reporting, notification and disclosure
- Remediation planning and implementation
Use of a third party to assess the security capabilities of products and/or services.
- Controls assessments and attestations
- Third party assurance
- Risk and compliance management