This service is ideal for innovative organisations that want to guarantee their cyber security and their strategic advantage, relying on open source information related to their activities. Very few organisations are able to have both services internalised because of the costs involved. RedTeam CyberWarFare enables you to externalise both departments and receive regular intelligence reports about key issues to maintain your leadership.
- Security of Critical Information Plan
Development of Plan and Recommendations
Protection of Intellectual Property – Design and Classification of Protected Information
Encrypted System and Protection of Competitive Information (technology, intellectual property, processes)
Implementation of Training Plan – Sensitivity (annually) - Fast Impact Measures
System revisions, web and configuration of servers
Verification of SSL (Secure Sockets Layer)
Update of vulnerable programs
Update of cyber security programs
Implementation of System Backup
Protection and Control of Access to Critical information - ISMS and Cyber Crime Prevention Surveillance
Design and implementation of Information Security Management System (ISMS)
Activation of a Cyber security Control Centre
Inventory Update
Operation of Security Control System (less than 24 hr response)
Monitoring of servers, computing devices and mobile devices
Monitoring and encrypting the security in the cloud.
Security alerts based on inventory of applications
Responses and proposals to Incidents
Proposals to resolve vulnerabilities
Periodic reboot of mobile and computing systems
Security backup
Damage Insurance for cyber attacks
Continued Training
Security Transformation - Personal Data Protection Act Plan (DPA)
Scope of implementation of the plan
Measures, rules, procedures, laws and standards
Employee information and obligations
Procedure for notification, management and answers when faced with an incident
Revision procedures
Annexes: File descriptions – Appointments – Authorisation to exit/output or recuperate data
Delegation of authorisations – Inventory Support – Incident log – Processing managers –
Input and output support log – Alternative measures - Intelligence Centre
Activation of Corporate Intelligence Centre
Competence studies
Company credit rating studies - Competitive Intelligence Management
Risk analysis
Vulnerability detection
Corporate Counterintelligence
Competitive Monitoring
Monitoring of Corporate Standing
Social Network Monitoring
Media tracking
Employee standing tracking
Revision of organisation charts
Revision of standing of key personnel
Market investigation
Preliminary analysis of country risk
Regular reports