top of page

Threat Hunting
Cyber Intelligence
DESCRIPTION:
This service enables "CLIENTE" to take a proactive approach to identifying potential cybersecurity compromises within its infrastructure. The Silent4Business team starts from a hypothesis based on known threats, vulnerabilities, and/or cyber intelligence reports, including the most recent TTPs used by threat actor groups.
DELIVERABLES:
Executive summary (executive presentation):
• Scope of the analysis
• Most vulnerable assets
• Root-cause recommendations
Vulnerability matrix:
• CVE related to the vulnerability (when applicable)
• Risk classification
• Vulnerable asset
• Vulnerable service
• Vulnerability
• Vulnerability description
• Mitigation recommendation
CODE
THU
BUSINESS LINE
Cibersecurity
CATEGORY
Cyber Intelligence
RESPONSIBLE:
Eduardo Salmerón
METHODOLOGY:
Best practices such as SANS Institute and NIST
SCOPE:
1 Threat Hunting exercise
EXECUTION TIME
Volumetry:
• 1 exercise – 15 business days
bottom of page

