Professional Documents
Culture Documents
Athena Cyber Security v1.0 - Dec 2020 - WIP - KM Feb 21
Athena Cyber Security v1.0 - Dec 2020 - WIP - KM Feb 21
Athena Cyber Security v1.0 - Dec 2020 - WIP - KM Feb 21
Financially Motivated
71% of data breaches are financially motivated.
Ransomware is Business
According to the FBI, approximately $1 Billion per year
are paid to ransomware scammers.
Loss of Trust
8 out of 10 US citizens fear that business are unable to
secure their personal information.
200M 191M
Total People Affected Total People Affected
Data Breaches
150M 145M
10 Biggest
130M 110M
Total People Affected Total People Affected
94M 88M
Total People Affected Total People Affected
77M 11.5M
Total People Affected Total People Affected
Top Threat and Risks Faced in 2020
Phishing / Vishing
Malware / Ransomware
APT
DDoS
Vulnerability
ATM Skimming
4
Cyber Security Services Portfolio
Governance, Risk & Compliance IT Security Data Protection Threat Management Security Operations Identity & Access Management
• ISO / PCI -DSS/HIPAA/GDPR/ • End Point Protection and • Data Protection • Security Posture • Identity Governance &
CCPA Consulting, Assessment Next Generation Antivirus Framework, Policies and • SOC Consulting
Assessment Administration
and Implementation Controls
• Multi Scanning Antivirus • Security Analytics Planning
• Open Source • Access Management for
• IT Security Governance, Risk Engine • Data Discovery – Check Compliance Audit Web & Mobile
Management, Reporting, • Security Dashboard Design
Mitigation & Controls, • Network & Data Centre • Data Inventory • Web Threat Detection • Directory Services
Security Management • Log Correlation & Analysis
• Compliance Management &
• APT Risk Mitigation • Privileged Access
Audit Readiness • Web & Mobile Security • Risk Profiling and Data • Alert Tuning and
Strategy Management
Classification Optimization
• Third Party Risk Assessment • Penetration Testing • Advanced Security • Mobile Security
• Data Protection(at rest, • SIEM Health Check
Testing Services
• Enterprise Security – Gap • Web Application Security, in transit, in use and
Analysis, Continuous • Audits and Assessments • Enterprise Single Sign-On
Application Security during destruction) • Incident Response
Improvement Testing
• Alarm Monitoring, SOC • IAM Architecture Design
• Asset Inventory • Threat Intelligence &
• Cyber Security Risk and • Vulnerability Assessment Management Operations
Hunting • Cloud Single Sign-On
Maturity Assessment
• Malware, Ransomware • Reporting and Continuous
• Phishing / Spoofing • Technology and Product
• Business Continuity & Disaster analysis ->This should go to Improvements
Services Selection
Recovery Planning Threat management
• Privacy Framework
5
Governance, Risk and Compliance
Policy Management, Hardening Guidelines
GRC Tools:
Consulting, Assessment and Implementation
• RSA Archer
ISO 27001, NIST, COBIT • MetricStream
• OneTrust
PCI –DSS
Privacy requirements – GDPR, CCPA, HIPAA, PIPEDA
Business Continuity and Disaster Recovery Management Services
Vendor Risk Assessment Framework:
On-Premise /Cloud Selection Consulting • NIST
Risk Management and services • ISO
• COBIT
Cyber security Risk and Maturity • Atlas / Security Scoreboard
Vendor / Third Party Risk Assessment
Business Continuity and Disaster Recovery
Cyber awareness /training
For Leaders , Managers and basic awareness for Senior Citizens
Privacy training
Technical certification (CompTIA, CEH, CISSP, CRISC, CISM)
Secure SDLC and OWSAP, NIST, CIS, Security testing
Cyber Project for Student
With our rich domain experience and expertise, we can quickly transform your Cybersecurity posture without affecting your key business
6
IT Infrastructure Security
Network and Data Center Security Endpoint Security Tools:
• Server hardening • Crowd strike
• Cylance
• Network hardening
• TrendMicro
• Perimeter security • Digital Guardian
• Firewall Rule Review, Firewall Change Analysis • Metadefender, Virus Total
• Vulnerability assessment, Penetration Testing
• Patch Management
Web Application and Mobile Security Web App and Mobile sec Tools:
• Mobile Device Management • Fortify
• Checkmarks
• Web Application Security Testing (SAST, DAST) • IBM App scan
• Multi Scanning Antivirus Engine (Code Scanning) • Now secure
• Mobile app security assessment • Burp Suite
• BOT security assessment • Nmap
• Metaspoilt
Secure Dev Ops • AppScan
• CI/CD • Qualysguard
• Tool Integration and Automation • Acunetix
• Wireshark
Our experts would analyze your pain areas, and suggest/implement the best solution in the industry
7
Data Protection
Data Security Policy, Standards, Procedures and framework Data Protection Tools:
Classification and Segregation of Data • McAfee DLP
• Sophos Safeguard Encryption
IT Asset management, Asset Classification
• Symantec DLP
Data Discovery • Trend Micro
• OneTrust (Data Privacy)
Data Storage Encryption, Back Up, DLP, SIEM, MDM, DRM
• CoSoSys Endpoint Protector
• SECLORE
“Data is the new Oil”, we help you to protect your Data /IP with no compromise to your Business
8
Security Operations
Security Operation Centre (SOC) consulting and implementation
• SOC setup Security orchestration and Response
• 24/7 monitoring (SOAR / SOC) Tools:
• Reporting and Continuous Improvements • IBMQRadar
• Auditing and Compliance • Splunk
• Elastic
Security Dashboard Design • Exabeam
Log Correlation & Analysis
Alert Tuning and Optimization
SIEM & SOAR SIEM Tools:
• AlienVault
• Splunk
• Fortinet
• Rapid 7
• Log rhythm
With best-in-class infrastructure, we monitor your infrastructure 24/7/365 and take quick actions to keep your
9
Infra systems up and running
Threat and Forensic Management
Security Posture Assessment
16
Identity and Access Management
Identity Governance & Administration
Enterprise Authentication
• Multi factor
Directory Services
Privileged Access Management (CyberArk, Savyint, OneIdentity, SailPoint – Please reconfirm if they have PAM as they are known for IDAM
solution)
Cloud identity
15
Product Landscape
11
VCISO as a Service
Provide leadership on Risk, Governance, Incident Response, Disaster Recovery & Business Continuity
Facilitate the integration of security into your business strategy, process & culture
Serve as an Industry expert (HIPAA, PCI-DSS, NIST, ISO 27001, various standards, and compliances)
13
Testimony
Athena consistently exceeds our business targets, overcomes
challenges and goes the extra mile.~ Great Company, Excellent
Team and Partner.
14
CONTACT US
We look forward to hearing from you.
ATHENA
Technology Solutions
ATHENA
Technology Solutions
Malware / Ransomeware
APT
DDos
Vulnerability
ATM Skimming
4
Case Study
12