top of page

Threat Hunting

Cyber Intelligence

DESCRIPTION:

This service enables "CLIENTE" to take a proactive approach to identifying potential cybersecurity compromises within its infrastructure. The Silent4Business team starts from a hypothesis based on known threats, vulnerabilities, and/or cyber intelligence reports, including the most recent TTPs used by threat actor groups.

DELIVERABLES:

Executive summary (executive presentation):
• Scope of the analysis
• Most vulnerable assets
• Root-cause recommendations


Vulnerability matrix:
• CVE related to the vulnerability (when applicable)
• Risk classification
• Vulnerable asset
• Vulnerable service
• Vulnerability
• Vulnerability description
• Mitigation recommendation

CODE

THU

BUSINESS LINE

Cibersecurity

CATEGORY

Cyber Intelligence

RESPONSIBLE:

Eduardo Salmerón

METHODOLOGY:

Best practices such as SANS Institute and NIST

SCOPE:

1 Threat Hunting exercise

EXECUTION TIME

Volumetry:
• 1 exercise – 15 business days

© 2035 Hecho en Silent 4 Business

bottom of page