Specialist Cybersecurity Services [ contact:  Special Projects ]

These interim services involve taking IT security to a higher level as required within legal or regulatory compliance policy, (often as a response to some serious or high impact incident) that defines a more cogent and compelling security stance against highly capable, motivated, well-resourced and determined attackers.  The services include the preparation of some combination of a series of advanced facilities.  

CDD's bespoke services are geared to organisations that have access to a higher degree of knowledge of their own environment, appropriate skills and capabilities, and are responding to a threat presence that demands engineering commensurate with a level of risk arising from highly proficient cyberattackers targeting high value, mission critical IT assets which may imply serious organisational consequences if they achieve successful compromise.

CDD is also able to offer a temporary consultancy service encompassing the role of Interim Chief Information Security Officer (ICISO) or senior interim board level Chief Technology Officer (CTO) for organissations that require fresh minds on their IT security  problem space.


Prepare Formal Threat Targeting and Cyber Response:
Activity Based Intelligence
Advanced Threat Profiling 
Threat Hunting & Forensics

In response to high-impact cyberattack upon mission critical assets, it is necessary to consider and understand how such highly capable attackers behave.  

CDD can prepare best mechanisms (involving tools and processes that may already be available in their IT arena) for organisations to achieve such understanding, which will be essential for mitigation of risk arising from such individuals or groups.  


Identify Orchestrated Cyber 
Security Combinetrics:
Combined Vulnerabilities
Combined Vectors
Consequential Impact

High-impact cyberattack frequently involves the combination of a number of simple but carefully orchestrated facets that constitute complicated attack behaviour.  Unless the requisite depth of cybersecurity situational awareness is achieved, and the precise nature of vulnerabilities properly understood, such attacks may go unnoticed (and for extended periods of time), and with very great impact and consequences.  This is referred to as OPTIMIZED attack.

CDD can apply its systems to discern the many routes of combinatorial cyberattack and propose appropriate mitigation and response.


Undertake Advanced 
Service/Crypto Integration: 
Tool/Protocol Analytics
Advanced Cyber Awareness
Cyber Risk Transmutation

Many organisations are well equipped in terms of both toolsets and skillsets.  However, too much data or 'information overflow' can be a serious impediment to effective response and rapid resolution of serious cyberattack. It is critical to rapidly understand the precise nature of such attack, but without cluttering complex decision making processes that are critical to effecting success response. 

CDD is able to advise on methods to integrate processes and toolsets to better utilise security enforcing functionality and provide decision makers and technicians with only the necessary information they can properly use.  This is an essential first step in turning the risk of cyberattack back on the threat-actors.  

CDD Security Policy (Using NIST Policy As a Basis) In Relation To Advanced Cyber Security Practices

800-209          Security Guidelines for Storage Infrastructure
800-207          Zero Trust Architecture 
800-205          Attribute Considerations for Access Control Systems  
800-189          Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation 
800-186          Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters 
800-184          Guide for Cybersecurity Event Recovery 
800-162          Guide to Attribute Based Access Control (ABAC) Definition and Considerations 
800-137          Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations 
800-137A       Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment 
800-86            Guide to Integrating Forensic Techniques into Incident Response 
800-83 R.1     Guide to Malware Incident Prevention and Handling for Desktops and Laptops  
800-82 R.3     Guide to Operational Technology (OT) Security 
800-82 R.2     Guide to Industrial Control Systems (ICS) Security 
800-61 R.2     Computer Security Incident Handling Guide 
800-55 R.2     Performance Measurement Guide for Information Security 
800-55 R.1     Performance Measurement Guide for Information Security 
800-53 R.5     Security and Privacy Controls for Information Systems and Organizations 
800-53B         Control Baselines for Information Systems and Organizations 
800-53A R.5  Assessing Security and Privacy Controls in Information Systems and Organizations 
800-50            Building an Information Technology Security Awareness and Training Program 
ƒ800-97:           Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1     Guidelines on Firewalls and Firewall Policy 
800-35            Guide to Selecting Information Technology
800-34 R.1     Contingency Planning Guide for Federal Information Systems 
800-30 R.1     Guide for Conducting Risk Assessments 

All rights reserved. CyberDefenceDynamics 

© 2013-2024

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.