cyber

An attacker’s story

Cyber is not just about having an army of security tools in your arsenal. It’s knowing what threats to detect (external and internal) and when to respond accordingly.

​​Protect your business from an attacker’s perspective. ​​

This could be your cyber story.

Get relevant and timely intelligence to defend in both peacetime and wartime.​

1
2
3
3
1
2
2
00
01
02
03
detect
tap a card to flip your scenario

peacetime

detect

data

user, app, device, network, data

scenario

I want to know my weaknesses to understand my cyber risk posture and hygiene

theme
Attack Categorization​
vulnerability detection​
intelligence
Indicators of exposure​
Vulnerability Feeds​
Standards & policies​

wartime

discover

data

user, app, device, network, data

scenario

I want to discover the indicators for context to a potential attack or campaign

theme
Cyber Observables​
Environment Artifacts​
intelligence
Indicators of attack​
Intrusion signatures​
Business
Asset List

peacetime

control

data

user, app, device, network, data

scenario

I want a secure, compliant business with the right controls to protect my assets

theme
privilege entitlement & delegation management​
vulnerability management​
intelligence
Control tuning framework​
Control Catalog​

wartime

investigate

data

user, app, device, network, data

scenario

I want to analyze the event logs to determine the techniques and tactics used to attack my assets and  identify the threat actor

theme
Threat attribution
Campaign attribution​
intelligence
Indicators of compromise​
Behavioral indicators​
Threat Intel​

peacetime

eradicate

data

user, app, device, network, data

scenario

I want to eliminate an existing issue or incident and prevent another occurrence

theme
Incident Command​
Crisis indicators​
Escalation plan​
intelligence
Business Impact​
Threat Intel​
Information Classification​

wartime

contain

data

user, app, device, network, data

scenario

I want to contain an existing issue or incident to minimize technical impact through automation and prioritization. ​​

theme
Incident Indicators​
Dispatch Plan​
Response Playbook​
intelligence
Threat Intel​
Issue Management​
Incident Categorization​

peacetime

recover

data

user, app, device, network, data

scenario

I want to ensure I can recover from cyber attacks with minimal business disruptions ​

theme
security awareness​
crisis simulator​
post mortem​
intelligence
market intelligence​
risk appetite​
quality assurance​

wartime

report

data

user, app, device, network, data

scenario

I want to keep the stakeholders informed on the status of a breach / incident and prepare them for regulatory / contractual penalties​

theme
crisis communication​
breach response​
status page​
intelligence
social intelligence​
public relations​
risk tolerance​

discover

data

user, app, device, network, data

scenario

I want to discover the indicators for context to a potential attack or campaign

theme
cyber observables​
Environment Artifacts
intelligence
Indicators
of attack​
Intrusion signatures​
Business
Asset List​

wartime

detect

data

user, app, device, network, data

scenario

I want to know my weaknesses to understand my cyber risk posture and hygiene

theme
attack
categorization
vulnerability detection
intelligence
indicators of exposure​
vulnerability feeds​
standards & policies

peacetime

investigate

data

user, app, device, network, data

scenario

I want to analyze the event logs to determine the techniques and tactics used to attack my assets and  identify the threat actor​

theme
Threat
attribution​
Campaign attribution​
intelligence
Indicators of compromise​
Behavioral indicators​
Threat Intel​

wartime

control

data

user, app, device, network, data

scenario

I want a secure, compliant business with the right controls to protect my assets

theme
privilege entitlement & delegation management​
vulnerability management
intelligence
Control tuning
framework​
Control
Catalog​

peacetime

contain

data

user, app, device, network, data

scenario

I want to contain an existing issue or incident to minimize technical impact through automation and prioritization​​

theme
Incident Indicators​
Dispatch Plan​
Response Playbook​
intelligence
Threat Intel​
Issue Management​
Incident Categorization​

wartime

eradicate

data

user, app, device, network, data

scenario

I want to eliminate an existing issue or incident and prevent another occurrence

theme
Incident Command​
Crisis
indicators​
Escalation plan​
intelligence
Business
Impact​
Threat
Intel​
Information Classification​

peacetime

report

data

user, app, device, network, data

scenario

I want to keep the stakeholders informed on the status of a breach / incident and prepare them for regulatory / contractual penalties​

theme
crisis communication​
Breach
response​
Status
Page​
intelligence
Social intelligence​
Public
Relations​
Risk
Tolerance​

wartime

recover

data

user, app, device, network, data

scenario

I want to recover from cyber attacks with minimal business disruption

theme
crisis
simulation
security awareness
Post
Mortem​
intelligence
Market Intelligence​
Risk
Appetite​
Quality Assurance​

peacetime

cookie

what

You could have the latest army of cybersecurity tools but still unable to detect and respond to an attack.  Send your data from any cybersecurity tools to our platform through our APIs.  We will take care of the rest.

layers

remediation orchestration

continuous monitoring

examples

Crisis tabletop simulator
Gamified cybersecurity training & awareness
Vulnerability management
Event& alert management

cookie

what

You could have the latest army of cybersecurity tools but still unable to detect and respond to an attack. Send your data from any cybersecurity tools to our platform through our APIs.  We will take care of the rest.

layers

remediation orchestration

continuous monitoring

examples

Continuous breach & attack simulation
Penetration testing
Network security posture management
Cloud security posture management

cookie

what

You could have the latest army of cybersecurity tools but still unable to detect and respond to an attack. 
Send your data from any cybersecurity tools to our platform through our APIs.  We will take care of the rest.

layers

remediation orchestration

continuous monitoring

examples

Continuous breach & attack simulation
Penetration testing
Network security posture management
Cloud security posture management

cookie

what

You could have the latest army of cybersecurity tools but still unable to detect and respond to an attack. Send your data from any cybersecurity tools to our platform through our APIs.  We will take care of the rest.

layers

remediation orchestration

continuous monitoring

examples

Continuous breach & attack simulation
Penetration testing
Network security posture management
Cloud security posture management

co-create with us