Security Advisory and Assessment

[one_half]
[custom_list style="list-1"]
  • Network Vulnerability Assessment
  • Internal Penetration Assessment
  • External Penetration Assessment
  • Wireless Security Assessment
  • Network Security Assessment
[/custom_list]
[/one_half] [one_half_last]
[custom_list style="list-1"]
  • Cloud Security Assessment
  • Mobile/BYOD Security Assessment
  • Physical Security Assessment
  • Social Media Security Assessment
  • Social Engineering Security Assessment
[/custom_list]
[/one_half_last] [one_half]

Application Security Assessment

virus-scan-icon150
[custom_list style="list-1"]
  • Web Application Penetration Assessment
  • Mobile App Penetration Assessment (iOS, Android, HTML5)
  • Product Security and Penetration Assessment
  • Source Code Security Assessment
  • Threat Modeling and Architecture Assessment
  • Application Security Conceptualization and Design
[/custom_list] [/one_half] [one_half_last]

Information Systems Audit

social
[custom_list style="list-1"]
  • General Controls Review Audit
  • Application Control Review Audit
  • Technical Review Audit
  • Systems and Application Audit
  • Information Processing Audit
  • Systems Development Audit
  • Management of IT and Enterprise Architecture Audit
  • Client/Server, Telecommunications, Intranets and Extranets Audit
[/custom_list]
[/one_half_last] [one_half]

Incident Response

[custom_list style="list-1"]
  • Emergency Incident Response
  • Incident Remediation Services
  • Incident Response Program Development
  • Incident Response Staff Augmentation
  • Incident Response Retainer Services
  • Incident Perception Management
  • Incident Public and Media Relations
[/custom_list]
[/one_half] [one_half_last]

High-Tech Investigations

[custom_list style="list-1"]
  • Corporate
  • Employment
  • Embezzlement
  • Family Law
  • Fraud
  • Human Trafficking
  • Intellectual Property Theft
[/custom_list]
[/one_half_last] [one_half]

Electronic Discovery

[custom_list style="list-1"]
  • E-Discovery Identification
  • E-Discovery Collection and Preservation
  • E-Discovery Retainer Services
  • Expert-Witness and Litigation Support
[/custom_list]
[/one_half] [one_half_last]

Digital Forensics

[custom_list style="list-1"]
  • Mobile Forensics Investigation
  • Tablet Forensics Investigation
  • Computer Forensics Investigation
  • Digital Media Investigation
[/custom_list]
[/one_half_last] [one_half]

Incident Readiness

[custom_list style="list-1"]
  • End-User Security Awareness Training
  • Developer and Engineering Training
  • Incident Readiness Drills and Assessment
  • Incident Response Program Development
[/custom_list]
[/one_half] [one_half_last]

Business Continuity and Disaster Recovery

[custom_list style="list-1"]
  • BCDR Assessment
  • BCDR Walkthrough
  • BCDR Exercises
  • BCDR Program Development
[/custom_list]
[/one_half_last] [one_half]

Governance and Risk Management

check
[custom_list style="list-1"]
  • Security Governance and Program Development
  • Risk Assessments and Security Roadmap Development
  • Custom Remediation and Program Management
[/custom_list]
[/one_half] [one_half_last]

Staffing

check
[custom_list style="list-1"]
  • Custom Staff Augmentation
  • Security Staff Co-Sourcing
  • Virtual CISO/CSO
[/custom_list]
[/one_half_last] [one_half] [/one_half]
Professional Services November 18, 2010