Our approach begins with understanding the business requirements associated with the assessment, followed by a detailed topology mapping and base-lining the existing infrastructure identified in the scope. Upon completion of the infrastructure discovery, we commence a systematic vulnerability assessment of critical systems and network devices to identify threat vectors that may be behavioural in nature. A vigilant exploitation method is then reviewed and executed to identify the relevance of vulnerabilities that have been detected. Techniques such as Penetration Testing and social engineering may be employed during this phase. On completion of the technical vulnerability assessment phase, we move our attention to the Information Security.

Please get contact with us and let us look after your Information Security needs.

Posted by Derek Mizak

Cyber security consultant working on application of Artificial Intelligence to cyber security practice, Digital Forensic Investigator, ISO27001 lead auditor.