Cloud Security
Cloud security is an emerging capability based on the adoption and transition to cloud. Cyber Centurion engineers start with the migration of traditional cyber security to the cloud infrastructure and continue by evaluating new technologies such as Software Defined Perimeter, Machine Learning and Artificial Intelligence. We also understand that we must not lose focus of security best practices such as strong passwords, good user training and eliminating things like phishing attacks and mis-configurations. |
Compliance Assessments
Compliance assessments are a necessary component to any complete cyber security program and unlike risk or vulnerability assessments, compliance assessments measure against a specific standard. Our engineers are effective at compliance assessments because we understand the standards being measured and overlap between competing and complementary standards (such as PCI-DSS, NIST 800-53, ISO/IEC 27002, etc) |
Cyber Security Training
Cyber security training can take many forms, from annual refresher courses, to advanced device specific training. We measure the effectiveness of our training throughout the course, and in conjunction with our compliance, risk and vulnerability assessments, throughout the year. |
Risk Assessments
Understanding the risk to your organization is more than just applying a standard template to the enterprise. We evaluate your risk appetite across the organization, assess your exposure, develop mitigations to each risk, and build a prioritized list based on time to implement, cost, and effectivness. |
Security Operations
Security operations is more than just watching a system for anomalies, it also includes response activities. Our security operations engineers, understand the systems they monitor, the impact of adverse events, and the critical path to resolve those events. |
Security Strategy
Strategy comes from a clear, concise measurable goal and builds into an actionable plan. Our staff understand how to shape the goals, identify the capabilities and environment necessary to reach the goal, and implement the management processes and systems to monitor progress. |
Systems/Security Architecture
Building in security from the ground up is a key to maintaining a secure environment. Our architects, understand the relevant frameworks (TOGAF, DODAF, JARM, etc) and how to manage and implement security within those frameworks while maintaining the integrity and goals of the enterprise system. |
Vulnerability Assessments
Vulnerability assessments are the validation of all your security solutions. Our assessments can easily scale from one enclave or department to an entire enterprise and encompass, technical and non-technical security implementations from Firewall/system configurations, through user training and policy effectiveness. |