Purple Teaming/Collaborative Effort
Once your organization’s perimeter is compromised, many internal post-exploitation activities proceed unimpeded. Many businesses have the infrastructure and tools in place to allow for proactive attacker detection, however, these tools are primarily used for forensics purposes after a breach has been identified. Lares’s engineers will work with your staff to replay real-world attacker techniques through all aspects of an attack and post-exploitation lifecycle to ensure appropriate logging, detection, and alerting methodologies are in place.
Defensive Control Analysis
Most businesses have a mix of security technologies from different vendors in their network and may not know what value each of these technologies provides. Blind spots may exist that currently deployed technologies may help fill, and there may be multiple redundancies leading to a waste of security dollars. With a Defensive Controls Analysis, the Lares® engineers will work with your business to map your existing security controls across a range of compliance frameworks and best practices to ensure appropriate coverage.
Defensive Capability Measurement & Improvement
Do you have an existing security investment and don’t know where to go next? Lares’s engineers will work with your staff to help your business benchmark its current maturity and provide clear, actionable steps to increase your capabilities in small, but subtle changes to your people, processes, and technology.
Table-Top Scenario & Planning
Table Top walkthroughs of cybersecurity events provide your organization a high-level review in determining whether you have the right people, processes, and technologies in place in the event of a successful cybersecurity incident. Lares’s engineers will assist your business in developing robust scenarios based on actual incidents, and help in developing a remediation plan to resolve any gaps that may be identified during the exercise. Ensuring a proper response plan is in place BEFORE an incident occurs provides a good first step to successful recovery from an attack.
Many organizations rely on vendor-provided appliances to identify network compromises, and may not know how an actual breach appears in log files, SIEM dashboards, and alerting tools. Lares’s engineers work collaboratively with defensive security professionals within your business to perform common real-world attack scenarios, ensuring cyber-security incidents don’t go unnoticed.