top of page
CyberCheckup_Workbench 1_edited.png

Cybersecurity Consulting Services

Managed Services

Learn more >

1.png

Incident Response

2.png

Digital Forensics

3.png

Cybersecurity Consulting & Advisory

4.png

Cybersecurity Risk Assessment

INCIDENT RESPONSE

It is an agreement we make with our clients to be there when they have an information security breach or Incident.

 

This allows our clients to plan for the worst and ensure qualified experts are available to quickly investigate and help resolve cybersecurity incidents.

 

Typically, an IR Retainer engagement involves a Service Level Agreement (SLA) that includes a guaranteed 24-hour response to any reported Incident, as well as a block of professional services hours to conduct Incident Response Preparedness exercises annually.

DIGITAL FORENSICS

Digital Forensic Analysis is defined as the set of principles and techniques that comprise the process of acquisition, conservation, documentation, analysis and presentation of digital evidence and that, if necessary, it can be legally accepted in a judicial process.

Digital evidence is understood as a set of data in binary format, that is, it includes the files, their content or references to them (metadata) found on the physical or logical media of the attacked system. Within Digital Forensic Analysis (hereinafter DFA), we can highlight the following phases:

 

  •  Identification of the incident

  •  Collection of evidence

  •  Chains of Custody

  •  Preservation of evidence

  •  Analysis of the evidence

  •  Documentation and presentation of results

2.png

CYBERSECURITY CONSULTING & ADVISORY

3.png

Its objective is to provide support on issues related to cybersecurity management and everything related to the focused activities by a Chief Information Security Officer (CISO), who will provide support, attention to requirements and follow-up with the technical and business areas to guarantee due compliance with regulations and standards that suit the development of the organization without neglecting the technological risk and the safeguarding of the confidentiality, integrity and availability of the information processed, transmitted and stored in the technological infrastructure the client's.

SCOPE OF SERVICE

  • Training and Awareness

  • Definition of Cybersecurity Strategy and Government

  • Risk assessment

  • Regulatory and Regulatory Compliance

  • Consulting for strategic implementation of management systems aligned with the following international standards:

  1. ISO/IEC 20000-1:2011

  2. ISO/IEC 31000:2018

  3. NIST CSF y CIS/SANS 20 CSC

  4. ISO/IEC 22301:2019

  5. ISO/IEC 27001:2013

CYBERSECURITY RISK ASSESSMENT

Red Team_Working table 1 copy 11.png

CyberCheckup services provide the organization with the capabilities to identify the level of risk in the face of technological threats and regulatory compliance that could adversely impact the business, as well as provide alternative solutions that allow mitigating said risks, in accordance with regulatory requirements. or sector applicable to the client, CYBERPEACE will place special emphasis on identifying risks regarding the confidentiality, integrity and availability of information in transit and at rest in the clients' technological infrastructure.

SCOPE OF SERVICE

1 (one) Vulnerability Analysis and Penetration Testing (Internal/Gray Box) and Penetration Testing (External/Gray Box) exercise. The Penetration Tests contemplate and will be executed as follows:

 

  • Vulnerability Management.

  • Penetration Tests (Pentest), External.

  • Penetration Tests (Pentest), Internal.

  • OSINT and Social Engineering Exercises.

  • Code Audit (Static / Dynamic) and Mobile applications.

4.png
Incident Response
Digital Forensics
Cybersecurity Consulting & Adviosory
Cybersecurity Risk Assessment

SECURE YOUR NETWORK

WITH CYBEREYE

OF INGRAM

bottom of page