Security Assessment

Assessing the security posture of your organization is an essential part of your cyber security strategy, it facilitates in-depth planning and the fundamental framework needed to fend off potential attacks.

Our CyberOPS team is uniquely trained to assess the cyber readiness of your organization and the threats that target it.

Security Assessments
  • ICS Assessment

    The ICS (Industrial Control Systems) Assessment helps critical infrastructure organization assess their cybersecurity posture, in a non-invasive, nor aggressive method. The assessment is carried out by our CyberOPS team without the use of software-based agents or network scanning tools.


    The ICS assessment involves a 3 phased process, with the ultimate goal of protecting the critical infrastructure and their ongoing operations against cyber threats. The phases include:


    Phase 1: Risk Assessment

    A full risk survey that identifies any gaps in the infrastructure’s security posture, with specific recommendations for closing each gap.


    Phase 2: Plan

    After the initial risk assessment is finalized and reviewed, a detailed plan is formulated to bridge the gaps that were identified in the assessment.


    The plan includes:
    The Key Functions
    Adjustments of Policies and Procedures
    Changes in Architecture
    Physical Security
     Technologies and Organizational Culture and Awareness


    Phase 3: Deployment

    The last phase includes the implementation of new security controls, which include technology, people, and processes. All controls support and continuously monitor the infrastructure’s ongoing security operations and progress.

  • Threat & Risk Assessment

    The threat and risk assessment is comprised of several stages, carried out by our CyberOPS team. The assessment covers the threats and risks which your organization may be exposed to.


    Reconnaissance is an attack surface profiling method, it maps your business’s online assets, while running an attack surface analysis. CyberInt’s analysts team utilized our Argos Intelligence Platform to run an attack surface analysis, and profiling. The results of which make up a detailed findings report which includes the online footprint of the organization.


    Intelligence Collection
    A crucial stage of mapping the threats and risk which the organization is exposed to is the organization-specific intelligence collection. This process maps out the adversaries that may be targeting the organization or active in the industry.


    The intelligence collection includes:
    The exposure on Social Media networks
    Mapping the Organization’s Exposure on the Web
    Dark Web and Private Forums monitoring


    Risk Assessment
    Based on the findings of the prior stages, a detailed risk assessment is put together, factoring in all the organization’s assets and the threats that target them. Each asset, adversary, and related attack tool is factored in to assess the risks that the organization is exposed to.

  • Supply Chain Assessment

    CyberInt’s Supply Chain Assessment is a service that focuses on the potential risks associated with your supply chain, including your external suppliers, vendors and service providers.


    The service is a risk-based approach that includes periodic reviews of your supply chain and of the risks they are exposed to. The service is part of our Susan Solution for ongoing supply chain monitoring. Since you’re only as secure as your least secured vendor, an ongoing assessment of your supply chain is crucial for closing off any gaps in your cybersecurity strategy.


    The service enables organizations to evaluate the current cybersecurity capabilities of their existing or future vendors. By collecting intelligence that relates to possible compromises of the supply chain and proactively identify vulnerabilities within the supply chain.


    The Supply Chain Assessment Process Consists of:

     Define – Defining your most important vendors
     Network Footprint – An independent Vendor’s threat intelligence assessment
    Specify – Specifying the necessary security requirements for each vendor in your supply chain
    Analyze – An in-depth research of the supply chain’s security vulnerabilities

    Ongoing Assessment – A Threat Intelligence process that continuously monitors the supply chain