TACTICAL SERVICES

ElysiumSecurity provides hands on and practical expertise to help companies identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organisation.

VULNERABILITY ASSESSMENT

Providing advanced Penetration Testing and Red Team activities, from physical security to social engineering and cyber-attacks at both an infrastructure and application level.

ElysiumSecurity has also extensive experience in responsibly gathering, refining and analyzing Open Source Intelligence (OSI), to deliver concise< and clear presentations of our findings and their implications. We have developed a methodology to generate a comprehensive OSI profile where we look at different environments related to an individual, categorise the information found, measure the associated risks and agregate the risk score results to produce an overall OSI summary and recommendations.

  • SANS Certified: Exploit Researcher and Advanced Penetration Tester (GXPN);
  • SANS Certified: Web Application Penetration Tester (GWAPT);
  • SANS Certified: Assessing and Auditing Wireless Networks (GAWN);
  • Infrastructure: Vulnerability Assessment, Penetration Testing, Red Team Scenarios;
  • Application: Web App, Mobile App, Desktop App;
  • People: Open Source Intelligence (OSINT), Phishing Tests.

  • >Back to the Top<

    RISK ASSESSMENT & REMEDIATION

    Helping identify and remediate what can negatively impact your ability to conduct business before, during and after an incident occurs.

  • SANS Certified: Forensic Analyst (GCFA);
  • Asset and criticality review;
  • Threat actors, attack vectors and attack surface assessment;
  • Threat Modelling (i.e.: STRIDE);
  • Risk Analysis;
  • Incident Response planning and execution.

  • >Back to the Top<

    EDUCATION

    Assisting with the identification, creation and delivery of Cyber Security awareness and training programs relevant to your organization.

    The human element is often referred to as the weakest link when it comes to the Cyber Security Defences of an organisation. For employees to have the right appreciation and understanding of IT operational best practises, it is often the differentiation factor stopping, or not, a malware/ransomware bypass your defences and enter a corporate IT infrastructure.

  • Mauritius MQA Trainer Certified
  • Awareness programs creation and delivery;
  • Training programs identification and delivery;
  • Staff awareness assessment;
  • Public speaking experience;
  • Lessons Learnt exercises.

  • >Back to the Top<