DefenseCraft

Cybersecurity

Our Philosophy

Cybersecurity is not a product that can be purchased, nor is it an IT specific function. It’s a continuous organization wide process of education and technological improvement.

Our Mission

To develop an organization wide security aware mindset melded with carefully crafted policy and robust security controls.

Professional Services

Design

  • Governance Frameworks
  • Network Architecture
  • Security Controls
  • Policy Development

Testing

  • Vulnerability Assessment
  • Penetration Testing
  • Compliance Audits
  • Social Engineering

Risk Management

  • Risk Assessment
  • Compliance Strategy
  • Contingency Planning
  • Supply Chain Protection

Training

  • Security Awareness Training
  • Social Engineering Defense

Superior security strategies from leading-edge research

Cyber criminals are giving executives and IT departments sleepless nights. And the worries are increasing with frequent news of data breaches and ransomware. We want to help you fortify your network and educate your staff.

We do more than just harden and test your network and communication systems. We assist your organization in developing an integrated security posture that is built around a knowledgeable workforce.

The Coming Internet Apocalypse (really!)

There’s a looming disaster on the cyber horizon coming to the Internet and cellular communications in the next few years(McGrew, 2015). Specifically, 90% of the current encryption used for data transmission on the internet and in cellular phones will cease to be...

Risks of Counterfeit Hardware or Embedded Malware

Network and security hardware undergoes long and expensive design and development processes to remove vulnerabilities and flaws. Rogue hardware manufacturers in Asia are producing reverse engineered clones that mimic functioning and appearance of the devices for a...

Security Information and Event Management (SIEM)

A corporate data network transmits billions of data packets per day internally and out to the Internet. The data flow creates event records from many sources such as firewall security logs, user account sign on logs, and data resource access logs.  By NIST 800-53...

Cybersecurity and NAICS Codes

Overview The cybersecurity industry is an aggregation of products and services to protect computer networks from data confidentiality, integrity and availability. It’s vital to the health and continued functioning of the Internet and all connected organizations....

Risks of Third Party Service Providers or Vendors

Few organizations can afford the cost of a dedicated and fully staffed SOC with initial startup and annual operating costs in the millions of dollars. Many businesses are outsourcing the SOC and SIEM functions to third party service providers. This requires that the...

Integrating Disaster Recovery with Information Technology Governance Frameworks

Overview   Disaster of a natural or man-made variety can strike a business without warning and may cause damage serious enough to interrupt operations for a significant period of time. This would cause loss of profit and reputation and could negatively impact all...

DefenseCraft

Cyberspace is dangerous. We can help.

[zc4wp_sa3]

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”

Stephane Nappo, Global Chief Information Security Officer at Société Générale International Banking