Upload
others
View
11
Download
0
Embed Size (px)
Citation preview
FORENSICS
TRA
ININ
GSU
PPLY
CHA
IN MANAGEMENT
MANAGED INCIDENT RESPO
NSE
INFO
RMA
TIO
N ASS
URANCE AND RISK MA
NA
GEM
ENT
DISASTER RECOVERY
AN
D B
USI
NES
S CONTINUITY
DATA RECOVERY D
ATA
DIODE
CROSS DOMAIN DATA
TRAN
SFER
ASSURAN
CE/A
SSESS
4SECURE ERASE
VEH
ICLE
C
YBER SECURITY
BEST OF BREED SOLUTIONS, CONSULTANCY, MANAGED SERVICES AND TRAINING
CYBER SECURITY EXCELLENCE
COMPLIANCE AND AUDITING
• Document audit
• Regulatory compliance checks
• ISO27001
• Cyber Essentials
• Cyber maturity assessment
• Forensic readiness
MANAGED AND EXPERT SERVICESTaking the cyber security pressure from your organisation to allow you to excel at what you’re good at
DISASTER RECOVERY AND BUSINESS CONTINUITY
• Identify critical assets to protect
• Understand how to react and respond
• Build and maintain DR site to restore business operation
• Achieve compliance through effective DR planning
SECURITY OPERATIONS CENTRE
• Monitor and understand security issues that occur on your networks
• Protect and avoid any impact on your business
• SOC central monitoring unit
• Detection and alerting including SIEM, log management, threat management and compliance management capabilities
SECURITY TESTING
• Targeted attacks
• Red teaming
• Vulnerability assessment
• Penetration testing
• IT health check
DIGITAL FORENSICS AND DATA RECOVERY
• Recovering digital footprints for corporate and criminal investigation
• Recovering key information in response to an incident
• Investigation; vehicle infotainment, laptops, removable media, mobile phones, etc.
• Available to strengthen your existing capability or as a complete offering
• Forensic recovery workstations built for on-site investigation
INCIDENT RESPONSE
• Understand extent of the incident
• Maintain business continuity
• Protect your digital assets
• Protect your reputation
• Understand how to recover
4Secure | 24Secure | 1
SUPPLY CHAIN SECURITY
• What is a secure supply chain
• How to build a secure supply chain
• How to maintain a secure supply chain
• How to recover from a breach of the
• supply chain
• How to supply to HMG
CYBER SECURITY
• What is cyber security?
• Why does it effect me?
• How it effects my employer
• How to recognise potential attacks
• How to deal with potential attacks
INCIDENT READINESS
• Understand the threat
• Identify the risks
• How might I be compromised?
• Indicators of compromise
• Containment, evidence collection and recovery (eradication)
• What will I need to do to achieve this?
SECURITY AND RISK MANAGMENT
• Identify threats to your business
• Categorise your digital assets
• Understand the likely impacts of
• compromise
• Assess the risks
INTERNET SAFETY SECURITY
• How to manage your online presence
• Understanding the risks associated with an online presence
• What corporate information should be shared online
• How to prevent targeted attacks on you and your employer from information you share online
OPERATIONAL DIGITAL FORENSICS AND RECOVERY
•Howtoperformfastandefficient investigations required to discover and investigate cyber threats
• How to gather evidence for criminal or legal proceedings to aid any investigation
• How to use the latest digital forensics equipment
• How to present evidence to support employment tribunal proceeding
ISO27001
ISO/IEC 27001:2013 is the current international standard that sets out the requirements to establish, implement and continually improve an information security management system.
• Understand the requirements of this standard
• How to implement the requirements
• How to maintain compliance and audit the system
• How to transition from the older
• ISO27001:2005 to ISO27001:2013
ADVANCED THREAT METHODOLOGY
• What is Advanced Persistent Threat (APT)?
•Providesasimulatedofficeenvironmenttotrain
• How to recognise and advanced threat to your organisation
• How to defend against APT tactics
• Provides a practical demonstration of hostile hacking and attack scenarios
• Develops the necessary skills in building robust and effective protection and defensive networks to secure critical information.
CYBER LEADERSHIP COURSE
• Run by our virtual CISO, teaches the skills required to drive cyber security policy at a board level
• Provides the knowledge to make effective decisions on the cyber security priorities within an organisation
• How to enforce best practice methodologies to prevent cyber attack
• How to orchestrate a recovery from cyber attack should the worst happen
CYBER ESSENTIALS
• Cyber Essentials is a government-backed, industry supported scheme to help organisations protect themselves against common cybe attacks.
• Practical in depth review of how this applies to your business
• How to align your current practices with those set out within the Cyber Essentials scheme.
• How to maintain best practice as the system grows with your business
TRAINING SERVICESEducating you and your team to be best prepared for the cyber threat
4Secure | 44Secure | 3
TRAINING SERVICES4Secure offer a range of one-off ad-hoc forensic and recovery services to suit most business and law enforcement needs but also have a number of managed service offerings or a complete package than can provide a remote forensics response and recovery capability or buffer the existing skill set of your own forensic readiness team.
SOLUTIONS
FORENSIC SERVICES
• Digital analysis to evidential standards
• Analysis of Windows, MAC or Linux platforms
• Smartphone and mobile telephony forensics
• Vehicle Forensics, including In Car Entertainment
• Chip off/JTAG circuitry analysis
• Recovery of data
Allanalysis includeacomprehensive report that fits your requirements.Ourexperiencedanalystsareabletopresenttheirfindingsinaclear,concisemannerthatwouldbeacceptableinacourtoflaw.
MANAGED SERVICESA range of retained forensics services are available to provide your organisation with the rapid forensic response that is most appropriate to your needs.
“Evidence obtained from digital platforms is an essential ingredient of almost every investigation whether criminal, civil or even HR. Getting it right first time, every timeby experiencedwell equippedpersonnel iscore to 4Secure’s approach”
Jim Metcalfe
Head of Digital Forensics
Owl Computing data diodesNext generation cybersecurity solutions for highly restricted government networks and the operational networks of critical infrastructure operators.
DITTO DX• USB 3 Capable
• Dual output
• Up to 15GB a minute
USB 3.0• Dual writeblock ports
• Up to 37GB a minute
• Host powered
• Fast, compact, portable
4Secure examineThe 4Secure examine forensic workstation is designed for examiners by examiners. Standard features include: a high performance motherboard with an i7 quad core processor; 32 GB of RAM; 2 hot swappable bays for evidence images; a hotswapdockforfastevidencecaching,allconfigurabletomeet individual needs. The 4Secure examine also utilises trusted CRU-Wiebetech LabDock write blocked bays for a total forensic capability.
4Secure erase
• IAS5compliant,certifiedbyCESG
• Standalone hard drive erasure
• Unlimited, no licenses required
• Wipe speed: Up to 7GB a minute
4Secure | 64Secure | 5
Introducing the standalone hardware based tool for the erasure of hard disks to IAS5 standards certified by CESG
FEATURESCESG CertifiedIAS5 Compliant Overwrite or EraseStandalone device, no computer requiredWipe Speed: Up to 7Gb a minuteNo additional licenses required
FOR FURTHER INFORMATION
4secure-erase.com, 4-secure.com, 0800 043 0101, [email protected]
@4Secure @4Secure_erase #nomorelicenses