For many city and traffic employees, the threat of a data breach is a distant risk, something that only happens to other organizations. But it isn’t distant at all, it’s very real. City and critical infrastructure, like transportation, are high-value targets that are threatened and attacked daily, though most cases never make the news.
GRIDSMART has put together a process to help educate customers, identify specific needs, and provide proven, vetted solutions. Our goal is to guide customers to an improved security posture with a higher probability of recovering quickly with resilience in the event they experience a security breach.
Led by cybersecurity expert, Antonio (Tony) Rucci, GRIDSMART’s Information Security & Threat Intelligence Division (ISTI) will offer:
Passive Network Assessment – Macro-to-micro, non-volatile inspection of your public-facing internet presence; wireless deployment and internal network configuration. Minimal impact on your day-to-day operations providing an excellent starting point with remediation strategy included.
Penetration Testing – A more detailed and comprehensive review of your organization’s systems, devices, and network inside and out.
Employee Training – 75% or more of all data breaches are due to an internal employee making a mistake. Tricking an employee to open a file or click on a link is the lowest barrier to entry for any hacker and is the preferred means of attack.
Pentesting Products – Before you add a new device or product to a network, you should be asking yourself, “What potential risk does this add to our organization?” Pentesting allows you to get an independent third-party report to analyze the risk you may be unintentionally accepting.
Disaster Recovery Planning – Speed of response is one of the most important elements for limiting damages, cost, and amount of downtime. A well-crafted plan made in advance allows organizations to react immediately to a situation, saving precious time.
Beowulf – An innovative, next-generation threat intelligence platform, monitoring discrete communications platforms and data dump sites hosted in the DarkNet’s and DeepWeb’s hidden services. Beowulf uses complex algorithms to interrogate data, distinguishing threat from noise; reporting accordingly.
Data Breach Response – Stop the bleeding and ensure that no more damage can be done and a hacker’s access has been revoked.
Digital Forensic Analysis – Uncover what was accessed or stolen, how they gained access, and, many times, even who did it.