These interim services involve taking IT security to a higher level as required within legal or regulatory compliance policy, (often as a response to some serious or high impact incident) that defines a more cogent and compelling security stance against highly capable, motivated, well-resourced and determined attackers. The services include the preparation of some combination of a series of advanced facilities.
CDD's bespoke services are geared to organisations that have access to a higher degree of knowledge of their own environment, appropriate skills and capabilities, and are responding to a threat presence that demands engineering commensurate with a level of risk arising from highly proficient cyberattackers targeting high value, mission critical IT assets which may imply serious organisational consequences if they achieve successful compromise.
CDD is also able to offer a temporary consultancy service encompassing the role of Interim Chief Information Security Officer (ICISO) or senior interim board level Chief Technology Officer (CTO) for organissations that require fresh minds on their IT security problem space.
In response to high-impact cyberattack upon mission critical assets, it is necessary to consider and understand how such highly capable attackers behave.
CDD can prepare best mechanisms (involving tools and processes that may already be available in their IT arena) for organisations to achieve such understanding, which will be essential for mitigation of risk arising from such individuals or groups.
High-impact cyberattack frequently involves the combination of a number of simple but carefully orchestrated facets that constitute complicated attack behaviour. Unless the requisite depth of cybersecurity situational awareness is achieved, and the precise nature of vulnerabilities properly understood, such attacks may go unnoticed (and for extended periods of time), and with very great impact and consequences. This is referred to as OPTIMIZED attack.
CDD can apply its systems to discern the many routes of combinatorial cyberattack and propose appropriate mitigation and response.
Many organisations are well equipped in terms of both toolsets and skillsets. However, too much data or 'information overflow' can be a serious impediment to effective response and rapid resolution of serious cyberattack. It is critical to rapidly understand the precise nature of such attack, but without cluttering complex decision making processes that are critical to effecting success response.
CDD is able to advise on methods to integrate processes and toolsets to better utilise security enforcing functionality and provide decision makers and technicians with only the necessary information they can properly use. This is an essential first step in turning the risk of cyberattack back on the threat-actors.
800-209 Security Guidelines for Storage Infrastructure
800-207 Zero Trust Architecture
800-205 Attribute Considerations for Access Control Systems
800-189 Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation
800-186 Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
800-184 Guide for Cybersecurity Event Recovery
800-162 Guide to Attribute Based Access Control (ABAC) Definition and Considerations
800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
800-137A Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
800-86 Guide to Integrating Forensic Techniques into Incident Response
800-83 R.1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops
800-82 R.3 Guide to Operational Technology (OT) Security
800-82 R.2 Guide to Industrial Control Systems (ICS) Security
800-61 R.2 Computer Security Incident Handling Guide
800-55 R.2 Performance Measurement Guide for Information Security
800-55 R.1 Performance Measurement Guide for Information Security
800-53 R.5 Security and Privacy Controls for Information Systems and Organizations
800-53B Control Baselines for Information Systems and Organizations
800-53A R.5 Assessing Security and Privacy Controls in Information Systems and Organizations
800-50 Building an Information Technology Security Awareness and Training Program
800-97: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1 Guidelines on Firewalls and Firewall Policy
800-35 Guide to Selecting Information Technology
800-34 R.1 Contingency Planning Guide for Federal Information Systems
800-30 R.1 Guide for Conducting Risk Assessments
All rights reserved. CyberDefenceDynamics
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details and accept the service to view the translations.