Assessments

What you don’t know CAN hurt you!

Cloud Security Assessment

Native Tools are Not Enough

You’ve moved to the cloud or you grew up there. Your team may be leveraging the existing tools, and done some security configurations, but it is a rapidly changing environment. In the cloud security assessment we review your cloud infrastructure for security vulnerabilities and enable your team to understand where to focus your security defenses.

Compromise Assessment

Do You Have an Active Attacker in Your Environment?

Your attack surface has rapidly expanded recently, and you need visibility into where attackers may be lurking.  A compromise assessment analyzes your environment from an adversary’s point of view to reduce your risk and attacker dwell time.  Our analysis detects command & control activity, lateral movement, backdoors and, signs of persistence, following the MITRE ATT&CK framework.  

Compliance Readiness Assessment

Understand your Entire Security Posture

Is the California Consumer Privacy Act Legislation (CCPA) on your mind? CDG is well versed in this and many other regulatory requirements, such as GDPR, ISO27001, SOC2, HIPAA and PCI. We can assess your security infrastructure and provide guidance around your governance, risk management and compliance (GRC) program to determine if you’re not only secure, but compliant with the standard you need to attain.

Ransomware Readiness Assessment

Would You Survive a Ransomware Attack?

Ransomware is currently the #1 threat to most organizations.  Don’t be a victim. Ensure you know how your organization would fare against a simulated ransomware attack so you can successfully defend against an attack..  Our cloud security assessment includes Live Breach Attack Simulation, assessment of data backups and disaster recovery readiness.

Cloud Infrastructure

Get Clarity, Contact Us Today:

Protected Clients

We protect our clients from cyber criminals, and we create robust security programs which can withstand current and future threats.

Incident Response

If you have been the victim of a cyber attack, contact us right now.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team