5
F O R E N S I C S T R A I N I N G S U P P L Y C H A I N M A N A G E M E N T M A N A G E D I N C I D E N T R E S P O N S E I N F O R M A T I O N A S S U R A N C E A N D R I S K M A N A G E M E N T D I S A S T E R R E C O V E R Y A N D B U S I N E SS C O NT I N U I T Y D A T A R E C O V E R Y D A T A D I O D E C R O SS D O M A I N D A T A T R A N S F E R A S S U R A N C E / A S S E S S 4 S E C U R E E R A S E V E H I C L E C Y B ER S E C U R I T Y BEST OF BREED SOLUTIONS, CONSULTANCY, MANAGED SERVICES AND TRAINING CYBER SECURITY EXCELLENCE

CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

FORENSICS

TRA

ININ

GSU

PPLY

CHA

IN MANAGEMENT

MANAGED INCIDENT RESPO

NSE

INFO

RMA

TIO

N ASS

URANCE AND RISK MA

NA

GEM

ENT

DISASTER RECOVERY

AN

D B

USI

NES

S CONTINUITY

DATA RECOVERY D

ATA

DIODE

CROSS DOMAIN DATA

TRAN

SFER

ASSURAN

CE/A

SSESS

4SECURE ERASE

VEH

ICLE

C

YBER SECURITY

BEST OF BREED SOLUTIONS, CONSULTANCY, MANAGED SERVICES AND TRAINING

CYBER SECURITY EXCELLENCE

Page 2: CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

COMPLIANCE AND AUDITING

• Document audit

• Regulatory compliance checks

• ISO27001

• Cyber Essentials

• Cyber maturity assessment

• Forensic readiness

MANAGED AND EXPERT SERVICESTaking the cyber security pressure from your organisation to allow you to excel at what you’re good at

DISASTER RECOVERY AND BUSINESS CONTINUITY

• Identify critical assets to protect

• Understand how to react and respond

• Build and maintain DR site to restore business operation

• Achieve compliance through effective DR planning

SECURITY OPERATIONS CENTRE

• Monitor and understand security issues that occur on your networks

• Protect and avoid any impact on your business

• SOC central monitoring unit

• Detection and alerting including SIEM, log management, threat management and compliance management capabilities

SECURITY TESTING

• Targeted attacks

• Red teaming

• Vulnerability assessment

• Penetration testing

• IT health check

DIGITAL FORENSICS AND DATA RECOVERY

• Recovering digital footprints for corporate and criminal investigation

• Recovering key information in response to an incident

• Investigation; vehicle infotainment, laptops, removable media, mobile phones, etc.

• Available to strengthen your existing capability or as a complete offering

• Forensic recovery workstations built for on-site investigation

INCIDENT RESPONSE

• Understand extent of the incident

• Maintain business continuity

• Protect your digital assets

• Protect your reputation

• Understand how to recover

4Secure | 24Secure | 1

Page 3: CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

SUPPLY CHAIN SECURITY

• What is a secure supply chain

• How to build a secure supply chain

• How to maintain a secure supply chain

• How to recover from a breach of the

• supply chain

• How to supply to HMG

CYBER SECURITY

• What is cyber security?

• Why does it effect me?

• How it effects my employer

• How to recognise potential attacks

• How to deal with potential attacks

INCIDENT READINESS

• Understand the threat

• Identify the risks

• How might I be compromised?

• Indicators of compromise

• Containment, evidence collection and recovery (eradication)

• What will I need to do to achieve this?

SECURITY AND RISK MANAGMENT

• Identify threats to your business

• Categorise your digital assets

• Understand the likely impacts of

• compromise

• Assess the risks

INTERNET SAFETY SECURITY

• How to manage your online presence

• Understanding the risks associated with an online presence

• What corporate information should be shared online

• How to prevent targeted attacks on you and your employer from information you share online

OPERATIONAL DIGITAL FORENSICS AND RECOVERY

•Howtoperformfastandefficient investigations required to discover and investigate cyber threats

• How to gather evidence for criminal or legal proceedings to aid any investigation

• How to use the latest digital forensics equipment

• How to present evidence to support employment tribunal proceeding

ISO27001

ISO/IEC 27001:2013 is the current international standard that sets out the requirements to establish, implement and continually improve an information security management system.

• Understand the requirements of this standard

• How to implement the requirements

• How to maintain compliance and audit the system

• How to transition from the older

• ISO27001:2005 to ISO27001:2013

ADVANCED THREAT METHODOLOGY

• What is Advanced Persistent Threat (APT)?

•Providesasimulatedofficeenvironmenttotrain

• How to recognise and advanced threat to your organisation

• How to defend against APT tactics

• Provides a practical demonstration of hostile hacking and attack scenarios

• Develops the necessary skills in building robust and effective protection and defensive networks to secure critical information.

CYBER LEADERSHIP COURSE

• Run by our virtual CISO, teaches the skills required to drive cyber security policy at a board level

• Provides the knowledge to make effective decisions on the cyber security priorities within an organisation

• How to enforce best practice methodologies to prevent cyber attack

• How to orchestrate a recovery from cyber attack should the worst happen

CYBER ESSENTIALS

• Cyber Essentials is a government-backed, industry supported scheme to help organisations protect themselves against common cybe attacks.

• Practical in depth review of how this applies to your business

• How to align your current practices with those set out within the Cyber Essentials scheme.

• How to maintain best practice as the system grows with your business

TRAINING SERVICESEducating you and your team to be best prepared for the cyber threat

4Secure | 44Secure | 3

Page 4: CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

TRAINING SERVICES4Secure offer a range of one-off ad-hoc forensic and recovery services to suit most business and law enforcement needs but also have a number of managed service offerings or a complete package than can provide a remote forensics response and recovery capability or buffer the existing skill set of your own forensic readiness team.

SOLUTIONS

FORENSIC SERVICES

• Digital analysis to evidential standards

• Analysis of Windows, MAC or Linux platforms

• Smartphone and mobile telephony forensics

• Vehicle Forensics, including In Car Entertainment

• Chip off/JTAG circuitry analysis

• Recovery of data

Allanalysis includeacomprehensive report that fits your requirements.Ourexperiencedanalystsareabletopresenttheirfindingsinaclear,concisemannerthatwouldbeacceptableinacourtoflaw.

MANAGED SERVICESA range of retained forensics services are available to provide your organisation with the rapid forensic response that is most appropriate to your needs.

“Evidence obtained from digital platforms is an essential ingredient of almost every investigation whether criminal, civil or even HR. Getting it right first time, every timeby experiencedwell equippedpersonnel iscore to 4Secure’s approach”

Jim Metcalfe

Head of Digital Forensics

Owl Computing data diodesNext generation cybersecurity solutions for highly restricted government networks and the operational networks of critical infrastructure operators.

DITTO DX• USB 3 Capable

• Dual output

• Up to 15GB a minute

USB 3.0• Dual writeblock ports

• Up to 37GB a minute

• Host powered

• Fast, compact, portable

4Secure examineThe 4Secure examine forensic workstation is designed for examiners by examiners. Standard features include: a high performance motherboard with an i7 quad core processor; 32 GB of RAM; 2 hot swappable bays for evidence images; a hotswapdockforfastevidencecaching,allconfigurabletomeet individual needs. The 4Secure examine also utilises trusted CRU-Wiebetech LabDock write blocked bays for a total forensic capability.

4Secure erase

• IAS5compliant,certifiedbyCESG

• Standalone hard drive erasure

• Unlimited, no licenses required

• Wipe speed: Up to 7GB a minute

4Secure | 64Secure | 5

Page 5: CYBER SECURITY EXCELLENCE...2019/05/04  · • Cyber Essentials • Cyber maturity assessment • Forensic readiness MANAGED AND EXPERT SERVICES Taking the cyber security pressure

Introducing the standalone hardware based tool for the erasure of hard disks to IAS5 standards certified by CESG

FEATURESCESG CertifiedIAS5 Compliant Overwrite or EraseStandalone device, no computer requiredWipe Speed: Up to 7Gb a minuteNo additional licenses required

FOR FURTHER INFORMATION

4secure-erase.com, 4-secure.com, 0800 043 0101, [email protected]

@4Secure @4Secure_erase #nomorelicenses