top of page

OUR SERVICES

Learn all about our processes and solutions:

PRE-INCIDENT
Pre-Incident

PRIVACY IMPACT ASSESSMENT (PIA)

IT ARCHITECTURE SECURITY REVIEW

CONFIGURATION AUDIT

CYBER INCIDENT RESPONSE & FORENSICS

CYBER INCIDENT SIMULATION EXERICISE

SOURCE CODE SECURITY REVIEW & TRAINING

VULNERABILITY ASSESSMENT AND PENETRATION TEST (VAPT)

COMPLIANCE REVIEW

DATA BREACH PREVENTION & INFORMATION PROTECTION

POST-INCIDENT
Post-Incident

CYBER INCIDENT RESPONSE & FORENSICS

MALWARE REVERSE ENGINEERING

THREAT HUNTING

TECHNICAL ADVISORY SUPPORT FOR RESPONSES & REGULATORS

LESSONS LEARNT WORKSHOPS

POST-INCIDENT CONTROLS VERIFICATION

DARK WEB MONITORING FOR POST-MORTEM TRANSMISSION

MALWARE REVERSE ENGINEERING

We help our clients to reverse engineer the malware used in the attack to provide further evidence on the identity of the attacker and addiitonal countermeasures against the malware.

 

This helps our client to identify Indicators of Compromise (IoC) to allow threat hunting across the entire organisation.

THREAT HUNTING

We help our clients to scan their entire organisation for presence of a particular malware.

 

This helps to provide assurance to our clients that there is no hidden corner or blindspot that a specific malware is hiding in.

TECHNICAL ADVISORY SUPPORT FOR RESPONSES TO REGULATORS

We help our clients in reviewing the technical details in their response to regulators to ensure completeness and accuracy.

 

This helps our clients to provide useful technical information on a timely manner to the regulators.

LESSON LEARNT WORKSHOPS

We help our clients to conduct post-incident review workshops to identify lessons learnt / areas of improvement and action plans to implement improvements.

This helps our clients to have a clear direction and schedule on when and how the risks will be addressed.

POST-INCIDENCE CONTROLS VERIFICATION

We help our clients to verify that the implemented post-incident measures are effective.

This helps our clients to have confidence that their investments in the measures are bearing fruits.

DARK WEB MONITORING FOR POST-MORTEM TRANSMISSION

We help our clients to monitor popular forums in the dark web for presence of their sensitive data for a specific period of time after an incident.

This helps to our clients to know on a timely manner when their sensitive data is being peddled on the dark web after an incident.

Malware Reverse Engineering
Threat Hunting
Technical Advisory
Lesson Learnt
Post-Incidence Controls
Dark Web Monitoring For Post-Mortem Transmission
bottom of page