Source code audit
Defining policy and process
Security and compliance roadmaps
Security technology and process roadmap
Operationalizing security plans
Incident Response and Forensics
Technology and Process Implementation
Configuration and Policy Optimization
Advanced Adversary Protection
Endpoint Security Lifecycle
Active Vulnerability Control
Perimeter defense and Intelligence driven SIEM
A heightened level of detection and defense against the most sophisticated type of security threats – those that come from an Advanced Adversary.
Subjects covered will be as diverse as pentesting, network security, software and/or hardware exploitation, web hacking, reverse engineering, malware and cryptography.