In partnership with Threat Patrols
Rapid Cyber Security Review
WHAT IS a Rapid Cyber Security Review?
In partnership with Threat Patrols, PSA is able to provide Rapid Cyber Security Reviews to help our clients quickly uncover the cyber security landscape of their organisation, and obtain clear recommendations from long-time cyber security industry practitioners.
-
10 person-day engagement.
-
Whole of business -or- business-unit scoped cyber-security review based on client requirement.
-
Our team has practical real-world experience with 20+ years among US Silicon Valley technology start-ups -and- Asia Pacific technology company tigers.
-
Our leadership team has capacity to address client audiences from executive managers through to deep technical engineering level stakeholders.
-
Our cyber security team is actively engaged in cyber security technology engineering projects and has experience across many different technology stacks.
-
Our deliverable reports aim to provide practical recommendations that match your business maturity level and available budget.
-
We have a keen understanding of open-source tools and non-vendor approaches to achieve your cyber security outcomes.
-
We strive to be vendor neutral in our recommendations.
Nicholas de Jong has 20+ years experience in cyber security engineering, leadership and management. He has extensive experience establishing, building and operating companies in Information Security, Financial Services and Online Marketplaces in Sydney, New York, San Francisco and Manila.
Nicholas has occupied senior roles in technology based organisations with head-of cyber security responsibility and consulting roles ranging deep technical hands-on through high-level assessment and management functions. These have included; large scale online marketplaces (50M+ users); Licensed money escrow ($1Bn annual) services; Network security hardware design and manufacture; Anti-malware software-development and related signature-distribution services; Computational finance; Mining and resources; and Online gaming/gambling industries.
Nicholas is currently active in the development of security-engineering related projects with extensive technical knowledge ranging security fundamentals and protocols; modern security engineering and operations (SecDevOps); network engineering; software development and deployment; and infrastructure operations (DevOps).
Nicholas has led multiple security-compliance projects; cyber security regulator audits and incident investigations; third party reviews among customers, investors and insurers. He has experience engaging with law-enforcement on cyber-incidents; various payments fraud and at-scale abuse incidents.
Nicholas has a very keen sense for open-source and non-vendor solutions to provide appropriate security in production-infrastructure and enterprise-network environments and has led the purchase of various high-dollar ($1M+) value cyber security vendor tools and platforms.
What to Expect
-
10 day engagement* (usually 50% onsite, 50% offsite)
-
Client interaction days spread across 3 weeks
-
Focus on listening to the people in your organisation to discover how cyber security practices are actually occurring day-to-day; we then correlate this with the data and signals from our tools, scanners and information systems.
-
Report delivery within 30 days of engagement start.
-
2x reports; a Report of Findings & Observations; and a Report of Recommendations
-
Rapid reviews are time limited; findings, observations and recommendations are limited by time; time may be extended based on availability and mutual agreement.
What Not To Expect
-
Heavy reliance on automated vulnerability scanner reports; we use a range of excellent scanners to speed the client discovery and review process, however we do not pad-out our deliverables with hundreds of pages from automated vulnerability scanners.
-
Deep penetration style testing; we have professionally performed penetration-tests for 20+ years. Penetration tests can be useful for well functioning client cyber security teams, however they do not deliver whole-of-business cyber security review for the sake of broad form cyber security improvement.
-
Scanning or reviewing “testing” or “staging” environments; your threat actors are already scanning production environments, we will do the same.
Phases
- External threat review
- Internal systems threat review
- Business people, policies and practices review
- Cloud systems threat review
Typical flow
- Non-disclosure agreement
- Alignment meeting with client-side stakeholders
- Contract agreement
- Review engagement activities
- Report writing and report production
- Report delivery and client stakeholder presentation
- Invoicing / billing
- Follow on threat-management activity as requested by client
Deliverables
- Findings and observations report; covering external observability, internal observability, cloud-systems and workplace practices.
- Recommendations report; we aim to provide recommendations that match the business capacity and budget
- We often notice non-cyber-security items and will generally mention these as extras for clients to consider or be aware of.
- Client stakeholder presentation and final delivery.
Common Client Follow on Requests
- Threat discovery services; persistent daily / weekly / monthly threat discovery and alerting
- Threat tracking services; tracking and monitoring known and suspected client cyber threats
- Threat processing services; responding to client supplied cyber-threat reports; handle agency and exchange reporting; advise client remediation action
- Cybersecurity mentorship; cyber-security leadership assistance and roadmap guidance; capacity to assist management through to deep technology engineering
Contact
Got any questions? Send us a message at: