Cyber Emergency Response Team
WE CAN HELP YOU RESPOND
My-CERT™ is a concierge cyber incident response service that provides your organization with a group of experts to help you manage a cyber event.
Cyber Special Ops, LLC has partnered with the world’s leading data breach law firms, information security, public relations, identity monitoring and call center companies. We have also negotiated rates with each third-party service provider, with discounts like those afforded to cyber insurance carriers.
We also specialize in the recovery of monies due to wire fraud and social engineering attacks. Our team includes former Federal Investigators and Assistant U.S. Attorneys that have global experience in civil recoveries, skip tracing and asset forfeitures.
THE BENEFIT
Furnishes a unified cost-effective responsive with third-party subject matter experts in responding to a cyber event.
Cyber Insurance Advisory Services
Cyber risk is more than a stand-alone cyber insurance policy. Today, cyber risk is an evolving and dynamic peril that can impact every line of insurance coverage you purchase.
Cyber Special Ops, LLC can assist your Risk Manager, General Counsel or Board of Directors with an independent cyber risk insurance analysis that encompasses your entire insurance portfolio, including property, general liability, management liability, professional liability and crime. Our holistic analysis can also encompass the current regulatory and litigation landscape for data privacy protection.
THE BENEFIT
Assists your organization to maximize your potential insurance recovery from a cyber event.
Financial Crimes Advisory Services
According to the Internet Crime Complaint Center (IC3), Business E-mail Compromise (BEC) and E-mail Account Compromise (EAC) fraud continues to grow and evolve, targeting small, medium, and large business. Between December 2016 and May 2018, there was a 136% increase in identified global exposed losses.
The following BEC/EAC statistics were reported in victim complaints where a country was identified to the IC3 from October 2013 to May 2018:
Total U.S. Victims |
41,058 |
||
Total U.S. Victims Exposed Dollar Loss |
$2,935,161,457 |
||
Cyber Special Ops, LLC experts can evaluate your organization’s Automated Clearing House (ACH) and Electronic Funds Transfer (EFT) policies and procedures, perform transaction testing, and train key personnel to minimize the likelihood of BEC and EAC loss.
THE BENEFIT
Furnishes proactive techniques and methodologies to strengthen your security posture to minimize ACH and EFT financial loss.
Restitution Recovery Services
Many victims are interested in how they can be repaid for their incurred financial loss as a result of a cybercrime. In most cases, criminal restitution may be ordered where victims have suffered the loss of money or the damage or loss of property. Our Restitution Recovery Unit (RRU) was created to assist the victim in calculating damages, completing a Victim Impact Statement and in the collection of criminal restitution.
THE BENEFIT
Our Restitution Recovery Unit will maximize your financial recovery by utilizing our proprietary methodology in skip tracing, asset recovery and experience in working with both Federal and State Prosecutors and Courts.
Tabletop Exercises
Cyber Special Ops, LLC can offer a variety of customized cyber table top exercises. Exercises are designed to engage team members and get them working together to manage the response to a hypothetical cyber event. Exercises enhance knowledge of plans, allow members to improve their own performance and identify opportunities to improve capabilities to respond to real events.
THE BENEFIT
Enables your organization to recover quickly from an unexpected cyber event, protect your reputation and minimize operational loss.
Information Security Services
Vulnerability Testing – Internal
Scope of Work: We will conduct unobtrusive system vulnerability scans of your internal network to identify and rank discovered vulnerabilities. Scans may occur during business hours.
Our internal assessment will be conducted on-site and will not include exploitation of any identified vulnerabilities. Our team may include both automated and manual scans.
Scan Parameters: We will scan internal network devices, not limited to domain controllers, infrastructure services (WINS/DHCP/DNS), servers, workstations, printers and network devices. We can also examine the configuration of firewalls and routers.
Vulnerability Testing - External
Scope of Work: We will conduct unobtrusive system vulnerability scans of your external network to identify and rank discovered vulnerabilities. Scans may occur during business hours.
Our external assessment will be conducted off-site and will not include exploitation of any identified vulnerabilities. Our team may include both automated and manual scans.
Scan Parameters: We will scan internet facing systems and devices.
Wireless Testing
Scope of Work: We will conduct unobtrusive system vulnerability scans of your wireless network at your facility or a specific building to identify and rank discovered vulnerabilities. Scans are generally limited to non-business hours.
Our wireless assessment will be conducted on-site and will not include exploitation of any identified vulnerabilities. Our team may include both automated and manual scans.
Scan Parameters: We will scan a wireless network, usually limited to 802.11 technologies.
Social Engineering Testing
Scope of Work: We will utilize social engineering techniques to try and circumvent security controls in order to gain access to sensitive information or a restricted area in your facility. Attack parameters may include physical access, telephone and phishing emails. Social engineering attempts may occur during business and non-business hours.
Our external assessment will be conducted off-site and will not include exploitation of any identified vulnerabilities. Our team may include both automated and manual scans.
Social Engineering Parameters: We will attempt to gain access to a designated network and/or facility.
Threat Hunting
Scope of Work: We will proactively search through your network to detect and isolate advance persistent threats and zero day attacks that have infiltrated your network by evading existing security solutions. Threat hunting attempts may occur during business and non-business hours.
Threat Hunting Parameters: We will utilize manual and partially automated hunting techniques.
THE BENEFIT
Helps your organization manage the security of your assets such as financial information, intellectual property, employee details or information entrusted to you by third parties.
Cyber Crisis Communications Services
Organizations that make successful returns to normal operations with the least harm done are those that have a plan. A thoughtfully developed, consistently updated, and diligently tested Crisis Communications Playbook ensures your organization can quickly respond to a cyber incident.
THE BENEFIT
Addresses the internal and external communications needs of your organization to effectively respond to a cyber incident to preserve your brand, reputation and bottom line.