Post on 03-Apr-2018
transcript
7/28/2019 Marlabs Cyber Security New Offering Brochure
http://slidepdf.com/reader/full/marlabs-cyber-security-new-offering-brochure 1/4
New Offering 2013 Cyber Security Check - up Services
How "healthy" is your cyber security program? When was the last ti
you checked? Do you have the resource and time to review your cu
security control processes?
Marlabs Cyber Securi ty Check-up Services
7/28/2019 Marlabs Cyber Security New Offering Brochure
http://slidepdf.com/reader/full/marlabs-cyber-security-new-offering-brochure 2/4
1
Introduction to Cyber Security Check-up
Services
In order to ensure your security program is
operating at peak performance at all times, it
makes sense to have certified trained experts
perform periodic check-ups.
How "healthy" is your cyber security program?
When was the last time you checked?
Do you have the resources and time to review
your current security control processes?
Marlabs Cyber Security Check-up Servicesprovides your organization with focused,
detailed, advisory reports that include:
assessment, reviews, and recommended
corrective action plans of your security controls.
If you choose; Marlabs will even perform the
corrective action steps for you and/or assist
your IT/Security staff in doing so.
Our Cyber Security Check-up Services include:
Firewall Security Check IDS/IPS Assessment & Tune-up
Business Partner & Vendor Security Risk
Assessment Planning
Secure Disposal Planning
Employee Security Awareness Program
Development
Security Awareness Testing: Spear
Phishing
Social Engineering Scans
Mobile Device Security Assessment
Cyber Security & Performance Monitoring
We also provide Security Staff Augmentation in
a multitude of cyber security disciplines.
Firewall Security Check
Service Includes:
Assessment of Firewall Security Policy
This involves the review/testing of the
following:
o Policy review & testing
o Rule-set & mplementation Approach
o Maintenance & Management
o Physical Security of Firewall
Environment
o Information Security Policy
Firewall Administration Access:
o Access to the Platform
o Platform Operating System Builds
o Failover Strategies
o Logging Functionality..
o Security Incidents
o Backups
IDS/IPS Assessment & Tune-up
Service Includes:
Fine Tune Security Capabilitieso Information Gathering & Logging
o Detection & Prevention
Management
o Implementation Review
o Operation and Maintenance
Business Partner and Vendor Risk
Assessment Planning
Service Includes the review of vender security in
the following security area domains:
Organization
Employee Security Focus
Change, Identity, & Event Management
Network, Application, & System Security
7/28/2019 Marlabs Cyber Security New Offering Brochure
http://slidepdf.com/reader/full/marlabs-cyber-security-new-offering-brochure 3/4
2
Secure Disposal Planning
Service Includes Information Sanitization &
Disposition Decision Making:
Information decisions in the system life
cycle
Identification of the need for media
sanitization
Determination of security categorization
Reuse & Control of media
Sanitization and disposal decisions
Verification Methods
Review, develop, and/or revise
documentation
Employee Security Awareness Program
Development
Service Includes:
Designing Awareness & Training Programs
o Structuring Client Awareness & Training
o Conducting Needs Assessment
o Developing Strategy and Plan
o Establishing Priorities
o Addressing Funding & Training
Developing Material
Implementing Programs
Security Awareness Testing - Spear
Phishing
Leverage NEXPOSE SOCIAL SCAN
Perform variations of Spear-phish attacks
Produce results report Recommend corrective actions
Social Engineering Scans
Exploit the Following Threat Vectors
Mobile Device Security Assessment
Service Includes:
Wireless Scan
Mobile Device Strategy Assessment
Mobile Device Security Control Domain
o Mobile Asset Inventory
o Mobile Device Provisioning
o Mobile Software Distribution
o Mobile Security Management
o Mobile Device Protection
o Monitoring and Help Desk Support
o Managing Diversity of Mobility
Platforms
Services
Gather Intelligence
Establish Trust
Exploit Trust
Use Information
Vectors Phone
Personal
Online
Trash
Reverse
7/28/2019 Marlabs Cyber Security New Offering Brochure
http://slidepdf.com/reader/full/marlabs-cyber-security-new-offering-brochure 4/4
3
Cyber Security & Performance
Monitoring Tiger Team
Service Includes:
Red Team Methodology:
Information and Intelligence Gathering
Threat Modeling
Vulnerability Analysis and Exploitation
Risk Analysis and Quantification
Reporting
Cyber Security Staff Augmentation
Service Includes:
Cyber Security Workforce FrameworkSpecialty Areas Include:
Securely Provision: Concerned with
conceptualizing, designing, and building
secure IT systems
Operate & Maintain: Responsible for
providing support, administration, and
maintenance necessary to ensure
effective and efficient IT system
performance and security
Investigate: Responsible for
investigation of cyber events or crimes
which occur within IT Systems and
networks
Collect and Operate: Responsible for
the investigation of cyber events or
crimes which occur within IT Systems
and networks
Analyze: Responsible for highly
specialized and confidential
information that may develop
intelligence
Oversight & Development: Provide
critical support so others may conduct
their cyber security work
Marlabs Inc. One Corporate Place South, Piscataway NJ 08854
For more information, please call us at +1(732)-694-1000 or email us at sales@marlabs.com
www.marlabs.com
© Copyright 2013 Marlabs Inc. All rights reserved.
Due to specific non-disclosure agreements in force, project references and
further details can be provided only on request.
Security
Provision
Analyze
Operate &
Maintain
Support
Operate &
Collect
Protect &
Defend
Investigate