DefenseCraft

Cybersecurity

Our Philosophy

Cybersecurity is not a product that can be purchased, nor is it an IT specific function. It’s a continuous organization wide process of education and technological improvement.

Our Mission

To develop an organization wide security aware mindset melded with carefully crafted policy and robust security controls.

Professional Services

Design

  • Governance Frameworks
  • Network Architecture
  • Security Controls
  • Policy Development

Testing

  • Vulnerability Assessment
  • Penetration Testing
  • Compliance Audits
  • Social Engineering

Risk Management

  • Risk Assessment
  • Compliance Strategy
  • Contingency Planning
  • Supply Chain Protection

Training

  • Security Awareness Training
  • Social Engineering Defense

Superior security strategies from leading-edge research

Cyber criminals are giving executives and IT departments sleepless nights. And the worries are increasing with frequent news of data breaches and ransomware. We want to help you fortify your network and educate your staff.

We do more than just harden and test your network and communication systems. We assist your organization in developing an integrated security posture that is built around a knowledgeable workforce.

Website Risks

Websites are problematic for cybersecurity because they’ve grown from a simple information page to interactive scripted content management systems that act as the front end for an organization’s database. It’s essentially a public facing application that’s allowed to...

Stakeholders and Ethics of Cybersecurity

The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book "Stakeholders of the Organizational Mind" and broadens...

Ethics of Information Security

The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book "Stakeholders of the Organizational Mind" and broadens...

Application Lifecycle Management in High Security Systems

Overview   Security of software products during both development and operations is vital and can effects national security, therefore the security control baseline selected will be ‘high-impact” criteria in NIST 800-53 based on the criteria in NIST 800-60 stating...

Risks of Counterfeit Hardware or Embedded Malware

Network and security hardware undergoes long and expensive design and development processes to remove vulnerabilities and flaws. Rogue hardware manufacturers in Asia are producing reverse engineered clones that mimic functioning and appearance of the devices for a...

Legal Requirements of Information Security

Businesses must fulfill their legal duty to protect the confidentiality and integrity of data. Most industrialized nations and US states have legal requirements for data security(Brotby, 2009, p. 14). Failure to comply range from severe financial penalties to prison...

DefenseCraft

Cyberspace is dangerous. We can help.

[zc4wp_sa3]

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”

Stephane Nappo, Global Chief Information Security Officer at Société Générale International Banking