Intelligence Capabilities and Services
Cyber Risk Assessments
Armed with years of experience, cutting edge technology, and the tactics used by hackers, we challenge your defenses. Fortalice can find the vulnerabilities in your processes and technologies before the adversary.
Vendor Management Reviews/Assessments
Third-party suppliers play a huge role in the development of a company’s incident response plan. The most notable data breaches you have read about in the news have occurred due to a breach via a trusted vendor. The current approach to breach recovery is becoming obsolete as attackers find new ways to infiltrate. It is vital to review the access and vulnerability any outside vendor may have to your business’ data through the lens of a potential cyber incident. What is their cyber response? Cyber watch? Cyber Incident Response?
Security Posture Assessment (Blue Team)
Learn from subject matter experts where your infrastructure and systems have weakness which could materialize into business risk.
Table Top Exercises and Training
Fortalice Solutions will develop, tailor, and execute table-top exercises to train and test the preparedness of your key personnel. We will also do so for processes associated with your company’s incident response plans and capabilities. Fortalice will simulate real-time events, and other planned inserts, that would impact your enterprise and the strength of your response.
Review or Implementation of Cyber Security Policies and Procedures
Deploy education, training, and actionable policies for end users and business leaders to lead the organization towards a more mature risk posture.
Cyber Incident Response Program
You are in the middle of a breach. Do you know who to call? When do you engage the Legal department or Communications? Will this hit the mainstream media? These are all questions you need to answer, practice, and prepare for before a breach.
Our team has had to answer these questions as a client and for our clients. We have developed a set of proven best practices that will give your organization a jump start on enhancing or developing your Incident Response program. Think you have a great plan? Then let us conduct a tabletop exercise to see how well your plan holds up.
We offer our team of cyber security experts to brief your Board or members of your executive leadership team on matters of cyber security.
Fortalice can develop employee and executive cyber webinars for your employees on a myriad of cyber security topics from incident response planning to basic IT security.
Invite our team of experienced technologists and policy wonks to work one-on-one with your security and business teams to assess the security of any system or processes.
Insider Threat Program
Assess your network from the inside out; learn how an insider could threaten your infrastructure.
Cyber Risk and Governance
Determine if the people, process, and technologies are adequate in the face of the legal, reputation, and operational risks facing entities today.
Penetration Test (Red Team)
Understand your network from the adversary’s point of view. This test includes full-scale reconnaissance and attacks from the perspective of an external hacker.
Reputation and Threat Monitoring
Cyber Protection for High Profile Individuals
Let Fortalice Solutions be your digital bodyguard. Our personalized services can discretely protect your digital life 24x7x365.
Fortalice utilizes a number of technologies to provide ‘geo-fencing’ which can enable near real-time alerts on social media mentions in specific areas.
Investigations & Data Purging
Fortalice responds to and investigates threats and incidents that compromise our clients — including purging digital footprints.
Revenge Porn Incidents
Trademark & Copyright
Data Aggregator Purging
Reputation & Threat Feeds
State-of-the-art technologies and methodologies to create tailored information feeds that alert us to mentions in the media, on social networks, the deep/dark web, and web forums.
Social Media and Open Source Analysis, Research, & Training
Learn the skills of the Red Ninja with our customized Open Source Analysis Training Program.