Security Program Assessment

Improve your security posture by evaluating your information security program

 

The Security Program Assessment draws on our collective expertise to deliver tailored, actionable recommendations to improve your security posture reduce risk, and mitigate the impact of security incidents.

Service Overview

The Security Program Assessment starts with the latest industry standards. It then incorporates the deep experience and knowledge gained from responding to hundreds of computer security incidents to generate high-quality recommendations across 10 critical security domains. During the Security Program Assessment, our consultants perform interviews, collect evidence and review artifacts. At the same time, they facilitate workshops to ensure future improvements can be understood and successfully implemented by your team.

Executive Threat Briefing

Our intelligence analysts provide a summary of findings and recommendations that includes a threat intelligence report based on current observed attacker trends in your industry.

l

Security Program Roadmap and Recommendations

This strategic and tactical action plan provides recommendations on sequence and prioritisation to improve effectiveness across one or more of the 10 critical security domains.

Observations and Gap Analysis

Using an industry framework as a benchmark, we identify domains that require further development. We also provide a maturity plan for each domain to strengthen your security posture.

Threat Detection Report

Our consultants compare your company’s event logs to our proprietary Indicators of Compromise (IOCs) library to identify malicious activity. We provide a detailed report that includes a findings summary with insights into relevant threat actor profiles.

Our Approach

The Security Program Assessment evaluates your information security program’s overall effectiveness across 10 distinct security domains. At the end of the engagement, you receive a defined roadmap of short, medium, and long-term improvement initiatives for your organisation.

Z

Documentation Collection and Analysis

Our consultants review existing polices, standards, and procedures to gain an in-depth understanding of your current operational capabilities, existing technology, and the business environment.

Z

Interactive Workshops and Executive Meetings

Our experts will assess your organization’s maturity levels and compare the information we gather to best practices and industry standards so we can identify your organization’s short-term and long-term goals.

Z

Recommendations and Roadmap

We perform in-depth evaluation of the data collected during the assessment and provide detailed recommendations and an actionable implementation roadmap to support the achievement of your organisation’s immediate and future goals.

Our Team

Our digital forensic analysts are leaders in our field. We have produced outstanding results in literally hundreds of cases, and our experts have extensive testimony experience, advanced training, and certifications. We bring experience from both Law Enforcement and the Private Sector.

Forensic Instinct experts are trained and follow the practices outlined in the HB 171-2003 Guidelines for the management of IT evidence by Standards Australia. This document is primarily for investigative community and serves as the main guide to setting standards for Australian courts. As such, this sets the levels of expectations that digital evidence must meet as exhibits for consideration by the Judge and Jury.

Don't Be Shy

Write, call or click to contact one of our digital evidence specialists.

Contact Us