CYBER DEFENCE

  • Establishing Certificate Authority and PKI
  • Establishing of CERT and conversion to CSS
  • Establishing Cyber Defense Center - CDC/SOAR
  • Encryption Strategy: Files, Network and Communication
  • Securing External Access/DIODE
  • ISO 27001 Implementation and/or Audit
  • SCADA Protection
  • Botnet detections and battling
  • Incident response and breach investigation
  • Malware Analysis (Static / Dynamic)
  • Developing National Information Security Standards

CYBER INTELLIGENCE & ANALYSIS

  • OSINT (Open Source Intelligence) & Semantic Analysis
  • Enabling Law Enforcement Agencies fighting Cyber Crime
  • Internet / Social Media Intelligence
  • Traffic – Analysis, Visualization & Re-construction
  • Cyber Criminal Tracking

CYBER OFFENSE

  • Vulnerability Assessment & Penetration Testing
  • Red Teams
  • Custom Exploits development for in-house developed systems
  • 0day , 0+1
  • Offensive Training