Profssional Services

 Our unique approach to professional services focuses on bringing the experience, knowledge and technical expertise. These services were designed to better assist in reaching compliance and governance needs and ensuring our customer maintain best-in-breed cyber practices.  


Compliance Assessments

Security & Compliance Assessments

 Global regulations are on the increase, there are increased expectations from stakeholders and as cyber attacks continue to proliferate, organizations need to be more vigilant than ever when measuring risk and security. They need to assess gaps in there security posture to better ascertain which risks have the greatest potential for legal, financial, operational, or reputational damage. Our approach is to ascertain an organizations gaps against regulations, frameworks and best practices to identify risks with the company's people, processes and technology.  

Penetration Testing

Penetration Testing

 Our unique approach penetration testing stems from the need to be prepared for an attack. We act as attackers would and test using black box, grey box and white box techniques as determined by our customer. Our penetration tests will employ common hacking techniques and are performed using automated internal penetration test tool, as well as other commercially available and homegrown tools.  

Virtual CISO

Security Consulting

With the ever-evolving threat landscape there is a need to understand the complexities that exist while defending your organization. The services performed by Inceptus provide you with cost-effective access to experienced professionals skilled in all aspects of information security. Whether it is across people, processes and technology, Inceptus can assist with your security strategy, execution of as-needed scoped services, and prioritize projects as pertaining to your specific risk(s). This value-added service can provide corporate leaders guidance and counsel to effectively address the cyber problem by providing pragmatic steps to reduce the risk over time as well as provide fingers on keyboard remediation's to fill the gaps.

Incident Response Services

Incident Response Services

  

Our unique approach to Incident Response is derived from the need to be prepared for an attack and the need to recover from one. In both cases we incorporate elements from prevailing security policies and compliance metrics such as NIST SP 800-61 R2 into our approach to ensure all IR Services are timely and effective identification, containment, recovery, and coordination of security incidences, with specific focus on preparation and prevention throughout. Inceptus will ensure you are prepared for an attack and can remediate after one happens.

image6

Policy & Procedures

  Our approach to Policies & Procedures engagement starts with conducting a Policy Gap Analysis to understand what policies and procedures the client has, what is missing, and how those policies and procedures relate to the organization’s business objectives and any compliance they must meet. Upon completion Inceptus will present the result of the gap analysis to the client for review. Inceptus will then work with the client to develop any missing content or missing policies.

image7

Compromise Assessments

Inceptus evaluates an organization’s enterprise for the presence of advanced attacks and malicious software.  Inceptus utilizes specialized tools and processes to detect and mitigate the impact associated with all levels of attackers, including the advanced persistent threats (APTs), to determine if attackers are currently in, or have been active in a Client’s environments 

Vendor Due Diligence

Vendor Due Diligence

Our unique approach to vendor due diligence aims to address the concerns and issues that may introduce risk that is associated while working with partners in today's connected environments. Inceptus has developed a process to assist and track information gathering efforts to determine if your partners are to be trusted with your data. With customizable approaches to determine if your partners are employing bets practices while handling your company sensitive data 

Security Awareness Training

Security Awareness Training

  

Our unique approach to security awareness training puts you in the room with some of our Experts . The team will provide training for users and staff on maintaining a secure enterprise day to day. The session will take about 1-2 hours and will include a presentation and interactive exercises. The Session includes real life case studies and knowledge shares for an understanding of the business value of security best practices, FAQ’s, common threats and education on the emerging threat landscape. The security training can be tailored for specific audiences and be delivered in person or through the web.

Phising & Vishing Services

Phising & Vishing Services

  

Our approach to phishing and vishing is to essentially do what he attackers would do. Inceptus will attempt to exfiltrate data or critical information from an organization using social engineering and email phishing campaigns on employees at the organization. By misrepresenting intentions, identities and credentials, Inceptus can show gaps in training and security awareness of the organization.