Managed Detection & Response
Always On – we ensure our customers’ resilience, 24x7x365
Read moreCyber Threat Intelligence
Word-class data, analysis and insights on threat actors and the evolving threat landscape.
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedEmergency Response Retainers
Get a fast response from world-class experts and rapidly reinstate business continuity.
Read moreConsulting
Highly specialized services to identify and remediate complex risks and threats.
AD Security Assessment Compromise Assessment Emergency Response Penetration TestingWhat’s New?
Emergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsEmergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat Monitors
Assume Breach Exercise Helps Identify Vulnerabilities and Improve Cybersecurity Posture
An Assume Breach test aims to simulate a cyber-attack on The Customer’s systems and defenses. The goal is to identify potential vulnerabilities and weaknesses in The Customer’s security posture.
By simulating a cyber-attack, The Customer can better understand where their defenses are strong and where they need to be improved. This can help the Customer prioritize their security efforts and make the necessary investments to strengthen their defenses.
CSIS can combine key elements of a simulated cyber-attack and build a test that reflects the risk appetite, the budget, and the compliance requirements of The Customer.
We do this by introducing a “Patient Zero” PC to the customer’s network. Once the PZ is given power and wired internet, it will act as an infected PC and will be used to gather intel from the customer’s network.
When we have gathered sufficient intel, which usually takes 2-4 weeks, we will initiate a range of simulated attacks, documenting how we compromise the network along the way.
All findings and actionable recommendations for mitigations are then shared with the customer in the form of a report.
We can either do it as an ad-hoc “see how far we get” exercise or go specifically after up to three targets pre-defined by the customer (e.g., compromising the Active Directory, the organization’s ERP system, or even the CTO’s email).
You have the option to expand the Assume Breach test with a range of add-ons.
The possible add-ons are:
Identify weaknesses and vulnerabilities in the organization's security posture
Determine whether your critical assets and data are at risk.
Mitigate financial, operational, and reputational losses caused by cyber-attacks.
Identify cyber security weaknesses before an attacker exploits them
Rest Assured.
We are the leader in actionable and intelligence-driven detection and response services.