THREAT AND VULNERABILITY ASSESSMENT

Context A medium sized mass media and telecommunications company engaged Cyber Security Team to perform vulnerability tests across the various technological security domains including the externally facing networks, internal networks, wireless networks and physical environment. What we did The scope of the vulnerability assessment included various technology security domains as following: – Email Phishing Campaign – Goal-based External

PRIVILEGED ACCESS MANAGEMENT

Context A medium sized insurance company was concerned with password theft of privileged accounts due to malware and installation of key-loggers. There was a needed to implement multi-factor authentication for privileged accounts and also track usage of sensitive credentials. The existing IAM environment was not matured enough to handle additional requirements and increased volume. What

IDENTITY AND ACCESS GOVERNANCE

Context A local hydro and utilities company wanted to facilitate user access recertification for various departments in order to meet internal governance and NERC CIP compliance requirements. Existing manual provisioning process was very cumbersome and lacked the required auditing capabilities. What we did – Built the full IGA server infrastructure for Dev, Test and Production