Experienced Global Cybersecurity expert with a proven track record of delivering innovative solutions to international corporates which enhance complex frameworks and lead to process efficiencies and cost savings.
Digital forensics is the use of specialized, investigative techniques and technologies to determine whether illegal or otherwise inappropriate events have occurred on computer systems, and provide legally defensible information about the sequence of those events. It also deals with the recovery and investigation of attacks found in digital devices including cybercrime situations, attribution, and identifying leaks within an organization.
Cyber Security attacks on organizational critical infrastructure are growing in number and sophistication. An unexpected shutdown due to interrupted operations can result in $ millions of production loss. Due to recent change in the cyber threat landscape, organisations should take the initiative to enhance the security measures in their environment to go beyond the traditional prevention and detection controls by proactively identifying the traces of compromises in the environment. We help deliver services of the best vendor who can provide continuous threat hunting and sweeping systems (clients and servers) and network for an indicator of compromises. The main objective is to detect, report and investigate the cybersecurity indicators of compromises.
Source Code Review
Manage risk proactively with automated and manual testing highlight developing faults, flaws and bugs in applications to identify dangerous coding practices.
Compromise Assessment
Technical Assessment and remediation of:
Unauthorised use of valid accounts and unauthorised file access
Trace evidence and partial files and cyber command and control activity
Suspicious network traffic and valid programs used for malicious purposes
Red Team Assessment / Purple Team Assessment
Simulates a real-life threat to help you find the gaps in your network before a hacker.
Security Network Architecture Review
Network Segmentation design
Zero Trust
Firewall Design
Social Engineering
Social engineering principally involves the manipulation of people rather than technology to breach security.
Cloud Security Assessment
Cloud Security Architectures
Identity and Access Management solutions
Endpoint solutions
Network and Infrastructure
Application designs
Manage project transitions and systems integrations
DOC, SIEM, IoT
Penetration Testing
External Penetration Testing
Internal Penetration Testing
Web Application Assessments
Mobile Application Assessments § IOT Assessment
RFID Assessment
ICS / Scada Security Assessment
Advance Persistent Threat Assessment
Theft of intellectual property, Theft of classified data
Theft of Personally Identifiable Information (PII) or other sensitive data