The Cyber Defense Service is a standardised product with the greatest added value that RedTeam CyberWarFare offers to organisations centred around handling critical information that must be protected with all guarantees against Advanced Persistent Attacks. This service, as well as the services described above, includes simulation, integrated operations, integrated security and countermeasures.
- Security of Critical Information Plan
Development of Plan and Recommendations
Protection of Intellectual Property – Design and Classification of Protected Information
Encrypted System and Protection of Competitive Information (technology, intellectual property, processes)
Implementation of Training Plan – Sensitivity (annually) - Fast Impact Measures
System revisions, web and configuration of servers
Verification of SSL (Secure Sockets Layer)
Update of vulnerable programs
Update of cyber security programs
Implementation of System Backup
Protection and Control of Access to Critical information - ISMS and Cyber Crime Prevention Surveillance
Design and implementation of Information Security Management System (ISMS)
Activation of a Cyber security Control Centre
Inventory Update
Operation of Security Control System (less than 24 hr response)
Monitoring of servers, computing devices and mobile devices
Monitoring and encrypting the security in the cloud.
Security alerts based on inventory of applications
Responses and proposals to Incidents
Proposals to resolve vulnerabilities
Periodic reboot of mobile and computing systems
Security backup
Damage Insurance for cyber attacks
Continued Training
Security Transformation - Personal Data Protection Act Plan (DPA)
Scope of implementation of the plan
Measures, rules, procedures, laws and standards
Employee information and obligations
Procedure for notification, management and answers when faced with an incident
Revision procedures
Annexes: File descriptions – Appointments – Authorisation to exit/output or recuperate data
Delegation of authorisations – Inventory Support – Incident log – Processing managers –
Input and output support log – Alternative measures - Intelligence Centre
Activation of Corporate Intelligence Centre
Competence studies
Company credit rating studies - Competitive Intelligence Management
Risk analysis
Vulnerability detection
Corporate Counterintelligence
Competitive Monitoring
Monitoring of Corporate Standing
Social Network Monitoring
Media tracking
Employee standing tracking
Revision of organisation charts
Revision of standing of key personnel
Market investigation
Preliminary analysis of country risk
Regular reports - Countermeasures
Detection and attacking tracking services
Design of infection attacking traps
Environment design with false information
Design of false information
Graph evaluation and revision
False advertising crackdown/False Target Design/ Protection from Malicious Advertising
Information and influence operations (Ethical Psychological Operations)VIP Cyber security
Control of integrity and ciphering of communication
Monitoring systems of key personnel
Personalised advice - Simulation
Cyber electronic warfare test
Physical attack test
Human attack test (social engineering)
“Red Team” operations of acquisition or sabotage
Drafting of Contingency Plan
Validation of Contingency PlanCorporate Public Diplomacy
Campaign design
Event Organisation support
Public Statement supportLaboratory
Specific systems design
Cyber defense system design
Experimentation tests