Take a deep look at key management personnel from an attacker’s perspective and develop a mitigation strategy.
Look through open-source data feeds to locate as much personally identifying information as possible…
Dark web and account breach databases
Social media and traditional media
Building permits and legal databases
Telecommunications data feeds
We then analyze this information and synthesize it into an attack surface
summary that illustrates the methods by which an attacker would begin an
operation. From this summary, we will generate and deliver a mitigation plan
with actionable steps to increase defenses.