Managed Detection & Response
Always On – we ensure our customers’ resilience, 24x7x365
Read moreCyber Threat Intelligence
Word-class data, analysis and insights on threat actors and the evolving threat landscape.
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedEmergency Response Retainers
Get a fast response from world-class experts and rapidly reinstate business continuity.
Read moreConsulting
Highly specialized services to identify and remediate complex risks and threats.
AD Health Check Compromise Assessment Emergency Response Penetration TestingWhat’s New?
Emergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsEmergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat Monitors
CSIS supplies a laptop to the customer, who then connects the laptop to the organisation’s network. The laptop establishes a secure connection back to CSIS, either via the organisation’s network.
The laptop is used to observe, collect and analyse information flowing through the organisation’s network. The work is primarily manual, although some processes are automated.
The test will typically run for 2-4 weeks, although this figure varies according to the nature of the organisation and IT setup.
As results accumulate during this period, CSIS increases the amount of active testing and applies a range of simulated attacks. The actual man hours spent on this are typically much less than the total duration of the test.
The customer may set up 3 pre-defined targets for simulated attack (e.g. compromising the Active Directory, the organisation’s ERP system, or even the CTO’s email).
Rest Assured.
We are the leader in actionable and intelligence-driven detection and response services.