DefenseCraft

Cybersecurity

Our Philosophy

Cybersecurity is not a product that can be purchased, nor is it an IT specific function. It’s a continuous organization wide process of education and technological improvement.

Our Mission

To develop an organization wide security aware mindset melded with carefully crafted policy and robust security controls.

Professional Services

Design

  • Governance Frameworks
  • Network Architecture
  • Security Controls
  • Policy Development

Testing

  • Vulnerability Assessment
  • Penetration Testing
  • Compliance Audits
  • Social Engineering

Risk Management

  • Risk Assessment
  • Compliance Strategy
  • Contingency Planning
  • Supply Chain Protection

Training

  • Security Awareness Training
  • Social Engineering Defense

Superior security strategies from leading-edge research

Cyber criminals are giving executives and IT departments sleepless nights. And the worries are increasing with frequent news of data breaches and ransomware. We want to help you fortify your network and educate your staff.

We do more than just harden and test your network and communication systems. We assist your organization in developing an integrated security posture that is built around a knowledgeable workforce.

The Importance of Governance Frameworks in Information Security

On May 7, 2014 Chinese hackers gained access to the United States Office of Personnel Management (OPM) but the breach wasn’t discovered until April 15, 2015, and the breach wasn’t announced until June 2015. The attackers had access to the OPM servers for almost a full...

Application Lifecycle Management in High Security Systems

Overview   Security of software products during both development and operations is vital and can effects national security, therefore the security control baseline selected will be ‘high-impact” criteria in NIST 800-53 based on the criteria in NIST 800-60 stating...

Integrating Disaster Recovery with Information Technology Governance Frameworks

Overview   Disaster of a natural or man-made variety can strike a business without warning and may cause damage serious enough to interrupt operations for a significant period of time. This would cause loss of profit and reputation and could negatively impact all...

The Iron Triangle: Cost, Quality, and Time

There’s a humorous sign frequently seen in various kinds of offices and workshops around North America. It says simply, “Fast, Good, or Cheap: Choose Two!” It’s a simple but useful model demonstrating the tradeoff between the constraints of quality, time, and cost. In...

Governance Frameworks in Cybersecurity Acquisition

A complete and mature organizational cybersecurity infrastructure requires the use of a governance framework such as COBIT 4.1 aligned with a security control framework such as ISO/IEC 27002:2005. This provides a process to manage the complex security control...

Identity Governance & Administration (IGA) Software

    Introduction   One of the foundational components of the security architecture is the management of identity credentials and authorization to interact with data. Currently the method is a manual paper-based system routed between the HR department...

DefenseCraft

Cyberspace is dangerous. We can help.

[zc4wp_sa3]

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”

Stephane Nappo, Global Chief Information Security Officer at Société Générale International Banking