Fortalice Services

Business Cyber Security

We provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses. Once we have determined your cyber health from every angle, we then take this vital, accurate assessment, to create a cyber defense. At any point, Fortalice can present board briefings, create webinars, and establish executive coaching to take your new defense to every level of your business across various platforms. Our goal is to keep your company abreast of modern cyber threats and create a defensive strategy with practical solutions to strengthen your key business objectives.

Intelligence Capabilities and Services

Cyber Risk Assessments

Cyber Risk Assessments

Armed with years of experience, cutting edge technology, and the tactics used by hackers, we challenge your defenses. Fortalice can find the vulnerabilities in your processes and technologies before the adversary.

Vendor Management Reviews/Assessments

Vendor Management Reviews/Assessments

Third-party suppliers play a huge role in the development of a company’s incident response plan. The most notable data breaches you have read about in the news have occurred due to a breach via a trusted vendor. The current approach to breach recovery is becoming obsolete as attackers find new ways to infiltrate.  It is vital to review the access and vulnerability any outside vendor may have to your business’ data through the lens of a potential cyber incident. What is their cyber response? Cyber watch? Cyber Incident Response?

Security Posture Assessment

Security Posture Assessment (Blue Team)

Learn from subject matter experts where your infrastructure and systems have weakness which could materialize into business risk.

Table Top Exercises and Training

Table Top Exercises and Training

Fortalice Solutions will develop, tailor, and execute table-top exercises to train and test the preparedness of your key personnel. We will also do so for processes associated with your company’s incident response plans and capabilities. Fortalice will simulate real-time events, and other planned inserts, that would impact your enterprise and the strength of your response.

Review or Implementation

Review or Implementation of Cyber Security Policies and Procedures

Deploy education, training, and actionable policies for end users and business leaders to lead the organization towards a more mature risk posture.

Cyber Incident Response Program

Cyber Incident Response Program

You are in the middle of a breach. Do you know who to call? When do you engage the Legal department or Communications? Will this hit the mainstream media? These are all questions you need to answer, practice, and prepare for before a breach.

Our team has had to answer these questions as a client and for our clients. We have developed a set of proven best practices that will give your organization a jump start on enhancing or developing your Incident Response program. Think you have a great plan? Then let us conduct a tabletop exercise to see how well your plan holds up.

Board Presentations

Board Presentations

We offer our team of cyber security experts to brief your Board or members of your executive leadership team on matters of cyber security.

Cyber Webinars

Cyber Webinars

Fortalice can develop employee and executive cyber webinars for your employees on a myriad of cyber security topics from incident response planning to basic IT security.

Customized Services

Customized Services

Invite our team of experienced technologists and policy wonks to work one-on-one with your security and business teams to assess the security of any system or processes.

Insider Threat Program

Insider Threat Program

Assess your network from the inside out; learn how an insider could threaten your infrastructure.

Cyber Risk and Governance

Cyber Risk and Governance

Determine if the people, process, and technologies are adequate in the face of the legal, reputation, and operational risks facing entities today.

Penetration Test

Penetration Test (Red Team)

Understand your network from the adversary’s point of view. This test includes full-scale reconnaissance and attacks from the perspective of an external hacker.

Reputation and Threat Monitoring

Cyber Protection for High Profile Individuals

Let Fortalice Solutions be your digital bodyguard. Our personalized services can discretely protect your digital life 24x7x365.

 

Geo-fencing

Fortalice utilizes a number of technologies to provide ‘geo-fencing’ which can enable near real-time alerts on social media mentions in specific areas.

Investigations & Data Purging

Fortalice responds to and investigates threats and incidents that compromise our clients — including purging digital footprints.

Threats/Harassments

Blackmail

Counter-Terrorism

Revenge Porn Incidents

Trademark & Copyright

Data Aggregator Purging

 

Reputation & Threat Feeds

State-of-the-art technologies and methodologies to create tailored information feeds that alert us to mentions in the media, on social networks, the deep/dark web, and web forums.

Social Media and Open Source Analysis, Research, & Training

Learn the skills of the Red Ninja with our customized Open Source Analysis Training Program.

Latest from the Wall