- Defence Home
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
- Defence Home
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section Dropdown Heading
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
Cyber Threat/Risk Assessment
- Defence Home
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
- Defence Home
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
-
Section dropdown description. Collaboratively utilize timely processes with best-of-breed e-commerce.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Risk Assessments
We provide in-depth assessments of an organization’s security control and maturity based on industry security standards, regulations and best practices.
Assessments includes risks and vulnerabilities, privacy impacts, enterprise maturity assessments and enterprise readiness against ransomware and other advanced, persistent threats.
We apply the following security standards and regulations:
NIST SP Series
ISO 27001/27002
IEC 62433 series (industrial control systems)
PCI-DSS
PHIPA
PIPEDA

Penetration Testing
Our award-winning ethical hackers scrutinize your environment and attempt to breach data. We develop and implement testing scenarios including red team and purple team exercises against applications, infrastructure, networks (including wireless), operating systems, databases and cloud.
Our penetration testing gives you a clear assessment of where your data could be vulnerable against unauthorized intrusion and presents a path forward to address vulnerabilities.

Cloud Security Assessment
Cloud environments are often built gradually, without overarching security frameworks and standards to support their configuration. This can create vulnerability to attacks.
Based on years of cloud-native experience and industry best practices, we review the security configuration of your Microsoft Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Office 365 environments to provide actionable, risk-based recommendations. Our assessments rely on CIS benchmarks.