ThreatandVulnerabilityAssessments https://www.cybersecdefense.com @cybersecdefense 13720JetportCommerceParkway STE13 Ft.Myers,FL33913 COPYRIGHT 2015,CybersecurityDefenseSolutions,LLC ALLRIGHTSRESERVED
ThreatandVulnerabilityAssessmentUOverview Table&of&Contents& SYNOPSIS' 3 UNDERSTANDING'TVAP ' 3 THE'PROCESS' 4 THE'REPORT' 4 SUMMARY' 5 ABOUT'CYBERSECURITY'DEFENSE'SOLUTIONS:' 6 2
ThreatandVulnerabilityAssessmentUOverview Synopsis& Identifyingandunderstandingwhatthreatsyouarevulnerabletoandwhatmayalreadybeonyour networkisthefirststeptoprotectingyourdata. It snosurprisethatthenumberandintensityofdatabreacheshasbeenontherise.seemseveryweek wehearaboutanotherlargeincidentinvolvingpersonalandfinancialdata.alongwiththenegative publicityaroundthesebreaches,thefinancialtollisalsoontherise. OurThreatandVulnerabilityAssessmentsarejustthat,trueassessments.Notjustautomatedscanner resultsputintoanicereport(ourreportsarenice,but ).Wethinklikeattackers.Welookatyour systemslikeanattackerwouldlookatthem,andgivehonesttrueassessmentstotheriskyoucould facefromreallifeattacksthathappenonadailybasis. Inaddition,weutilizeuptotheminutethreatintelligencetoaidinthediscoveryofvulnerabilitiesand threatsthatmayalreadybeinplaceandrunningonyournetworksandsystems. Understanding&TVAP && TheCDSTVAP (ThreatandVulnerabilityAssessmentPlatform)isaverysmallformfactordevice (shownbelow)thatallowsustoperformallinternalandexternalthreatandvulnerability assessments.thisdevicesitsonyournetworksegmenttoallowustoassessthevulnerabilitiesofthe systemsonthatsegmentandalsoplugsintoaspanportonyouredgeswitchingequipmentto monitoralltrafficgoingtoandfromyourfirewalltolookforthreatsandotherpotentiallymalicious traffic. TVAP% ConnectionbytheTVAPissecurelymadebacktoCDSutilizing4096BitkeysandAESU256Bit encryptedcommunications. OuranalystsutilizeourinUhouseTVAPtoassessyournetworksfromtheoutside,whilealsorunning assessmentsusingthetvapinstallonpremise. 3
ThreatandVulnerabilityAssessmentUOverview The&Process& OncetheTVAPisinplaceandtheagreeduponassessmentstartdateisreached,ouranalystsbeginthe assessment. OnlyauthorizedCDSpersonallyassignedtoyourprojectcanstartandviewthevulnerabilityand threatassessmentdataonyourcdsutvapaccordingtoyourrulesofengagement. Oncealldataiscollected,processed,verifiedandreviewedbyouranalysts,reportsareprepared showingalldatacollected,vulnerabilitiesfound,assessmentofcollecteddata,summarydataand recommendations. Thesereportsarethendeliveredanddiscussedforpossibleremediationtacticsandriskmitigation.If anyevidenceofexistingcompromiseisfoundduringthedataugatheringphaseoftheassessment, thesearereportedimmediatelytotheclientviaphone. Ifthelengthandreportingfrequencyoftheengagementisextendedandmultiple,theCDSUTVAP systemcantransmitallassessmentdatatocdsviathesecureconnectionforanalysisandreport generationatmultiplepointsthroughouttheengagement. Whentheengagementhasended,weutilizeourDataDestructionServicestoeradicatethedataonthe CDSUTVAP,andsendyouacertificateofdestructionifyousowish. The&Report& Oncethedataiscollectedandanalyzed,wegenerateourreport.Thereportconsistsofthefollowing sections: ExecutiveSummary Highleveloverviewofwhatwasdoneandwhen SummaryofResults Summationofitemsofinterestthatwerefoundalongwithariskrating foreachitem,brokendownby: o ExternalVulnerabilityAssessment o InternalVulnerabilityAssessment o ThreatAssessment ConclusionsandRecommendations APPENDIX AssessmentDetailedReportsandData WeprovideacondensedprintedreportthatdoesnotincludetheAPPENDIX,asitcontainsallthe detailedreportsanddataandistypicallyseveralhundredpageslong.wedoprovidetheentirereport inandencryptedelectronicformat. & & 4
ThreatandVulnerabilityAssessmentUOverview Why&you&should&do&a&Threat&and&Vulnerability&Assessment& Everybusinesshassomeelementofriskwhenitcomestotheirdataandelectronicsystems.Data breachesarenowcommonplaceandbusinessowners,culevelexecutiveandboardsofdirectorsare nowinthespotlightonwhatproactivestepstheyaretakingtosecuretheircomputersystems. ThepracticeofperformingregularThreatandVulnerabilityassessmentshasproventobeaneffective beneficialadditiontoanorganizationsecurityposture,nomatterthesizeoftheorganization. ByperformingaThreatandVulnerabilityAssessmentwithacompanythatthinkslikeattackers, organizationsroutinelydiscoverexposuresandrisksbeforepotentialattackersdo,ordiscoverassets currentlyunderattackthattheywereunawareof. Bycompletingcontinualassessmentsitiseasytoidentifypossiblesecurityconcernsthatmaybe presentonthenetwork,bothfromaninternalandanexternalperspective.earlydetectionintroduces theopportunitytoaddresstheissuesbeforetheattackerscanexploittheweakness,whichmaycause seriousdamagetothecompaniesassetsandpossiblytheirreputation.noonewantstohearabout theirsecuritydeficienciesontheeveningnewsorworse,fromtheircustomers. Summary& Ifyouhavequestionsorneedassistanceonimplementinganythinginthisoverview,needa VulnerabilityAssessment,PenetrationTest,PhishingAssessment,CybersecurityAwarenessTraining oranythingelserelatedtoyourorganizationscyberandinformationsecurity,pleasegiveusacall,or interactwithusonline.youcanemailusat,visitourwebsiteat https://www.cybersecdefense.com,followusontwitter@cybersecdefense,likeisonfacebookat https://www.facebook.com/cybersecdefenseorconnectwithmepersonallyonlinkedinat https://www.linkedin.com/in/cybersecdefense.wearehappytohelp 5
ThreatandVulnerabilityAssessmentUOverview About&Cybersecurity&Defense&Solutions: CybersecurityDefenseSolutionswasfoundedbyagroupofITprofessionalswithlongUtermDataand NetworkSecurity,SoftwareDevelopment,ITManagementandBusinessManagementbackgrounds. Ourfoundershaveleveragedsolutionstoassistprivateandpublicsectorcompaniesinbothnetwork anddatasecurityforover20years.drawingontheircombinedexpertiseindatasecurity,data Eradication,NetworkSecurity,EthicalHacking,DataForensics,DataRecoveryandBestSecurity Practices,CDSwasborntoassistcompanieswiththeirCybersecuritydefenses,bringingtogetherbestU ofubreedsolutionswitheducationandawarenessandaprovenmethodologytoassurethatcompanies aredoingeverythingwithintheirpowertodefendfromcyberattacks. Ourmethodologiesfollowindustrystandardbestpracticeincluding,butnotlimitedtotheNIST CybersecurityFrameworkandDHSCUCubedFrameworktoassurethatcompaniescanproveboth reasonableandreliableeffortstoidentify,protect,detect,respondandrecoverfromacybersecurity Incident. Weprideourselvesinourdetailed,handsUonapproach,customerserviceandquickreaction capabilities.wearededicatedtoourmission,visionandvalues: CDS'Mission:' Toenhancethesecurity,resiliency,andreliabilityofourclient scybersecuritydefenses.we accomplishthisbydeliveringhighuquality,innovativecyberanddatasecurityservicesandsolutions. CDS'Vision:' Tobearecognized,worldclassleaderinprovidingindustrychangingCybersecuritysolutionsto protecttheassetsofourclients,andtocontributeourknowledgetobettermentofthecybersecurity communityatlarge. Our'Core'Values:' ' IntegrityUUnifiedapproachtohowwedobusiness HonestyUDoingtherightthing,everytime RespectUValuingtheopinionsandperspectivesofothers DedicationUCommitmenttoourword DiligenceUWorkinghardtoprovidetherightsolutionsandsolvecomplexproblems Feelfreetointeractwithusonline: Web https://www.cybersecdefense.com TwitterU@cybersecdefense Facebook https://www.facebook.com/cybersecdefense Linkedin https://www.linkedin.com/in/cybersecdefense & 6