SlideShare a Scribd company logo
CYBER SSORR
DTS 5 CORE domains
DESIGN TRANSFORM SECURE
Cyber Security services portfolio
Chemicals
Emergency Service
Healthcare
Electricity and Water
Financial Services
Nuclear Power Plants
ICT
Government ( Public Administration )
Transportation
OIL AND GAS
Cyber Security Challenges in Enterprises Today
DESIGN TRANSFORM SECURE
Cyber Strategy cyber Secure cyber Operations cyber response cyber resilience
DESIGN TRANSFORM SECURE
Cyber Strategy
§ Cyber Risk management
§ Security regulatory and compliance
§ Cyber transformation
§ Cyber security strategy
§ Cyber risk maturity assessment
§ Executive cyber dashboard
§ Cyber security metrics
§ Education, Training & awareness
Cyber Strategy
ISO27001:2013
PCI-DSSv3.2
SWIFTCSF
IEC62443/ISA-99
Informationsecurityregulation- DUBAI
Signalintelligence–nesaIAS–unitedArabemirates
SaudiArabiamonetaryauthority - framework
CLOUD
MANAGEDSERVICES
BLOCKCHAIN
ARITICIALINTELLIGENCE
BIGDATAANALYTICS
FINTECH/IoT
IDENTITYACCESS&MANAGEMENT
DATAPROTECTIONPROGRAM
3-5yearcyberstrategy
Cybersecurityroadmap
Cybersecurityposture
Enterprisecyberriskview
Externalandinternalthreats
Managementandtechnicalrisks
Peopleprocessandtechnology
Cybersecurityeffectivenessindex
Securityawarenessindex
Securitytrainingindex
Securityincidentindex
Year-on-yearriskratingindex
Securityawarenessandtraining
Technicalsecuritytraining
Securitymarketingcampaigns
Learningthroughgamification
Securityawarenesseffectiveness
CyberRiskmaturityrating
Inherentcyberrisk
Riskmaturityacrossdomains
CyberRiskManagementFramework
CyberRiskAssessment
CyberRiskmanagement
Securitycompliance
Regulatoryandlegal
Cybertransformation
Strategy&roadmap
Cybersecuritymaturity
Executivedashboards
Securitymetric
Securityeducation
DESIGN TRANSFORM SECURE
Cyber SECURE
Cyber SECURE
§ Redteam - Offensive
§ Blue team - defensive
§ Whiteteam - advisory
Identityandaccessmanagement
Dataprotectionprogram
Cloudsecurityassessment
Securityarchitecture
Datacenterdesignandblueprint
ADVISORY
Vulnerabilityassessment
Penetrationtesting
Webapplication
Mobileapplication
Wirelesssecuritytesting
Socialengineering
Redteamingexercises
Offensivesecurity
Infrastructureprotection
Networksecurityprotection
Systemsecurityprotection
Endpointsecurityprotection
Applicationsecurityprotection
Vulnerabilitymanagement
Cloudsecurityprotection
DEFENSIVEsecurity
Cyber security for ot / ics
Cybersecuritypoliciesinot/ics
Cybersecurityoperationsinot/ics
Icssystemsassetmanagement
Cyberriskassessmentforics/scada
Gap analysisforics/scada
Otcyberresilience
Otsecurityarchitecture
Workforcedevelopment–cyber
Controlsmapping–iec62443
Scada/otnetworktrafficanalysis
Securityzoningandconduits
Csocforot
Otthreatintelligence
Industrial security
Oilandgas
Power–utilities
Nuclear
Airportsandaviation
Manufacturing
Chemical
Maritimeandtransportation
experience
TELCO security
Ss7andsigtransecurity
Mobilenetworksecurityarchitecture
Networkelementsecuritytesting
Minimumsecuritybaseline
Iotandm2msecurity
IPv6/DNS64security
Nationwideanti-ddosmitigation
TELCO security
IOT, Cloud & big data security
IOTsecuritycontrols
Cloudsecuritycontrols
Cloudsecurityassessment
Cloudsecuritygovernance
Cloudaccesssecuritybroker
BigdataHadoop cybersecurity
ElasticsearchlogStash&kibana- ELK
Emerging tech
Blockchain & fintech
Smartcontractauditing
applicationsecurityassessment
DESIGN TRANSFORM SECURE
Technology solutions – defense in depth
Data classification
DLP
Data-in-transit
Email security
Dns security
Packet broker
web filtering
SIEM 2.0
Policy compliance
irp
itsm
Automated SECURITY
ANALYST – ARTIFICIAL
INTELLIGENCE
wireless
Captive portal
MDM
NGFW P+V
Nips / Network AI
SSL VPN
NAC
DDoS mitigation
VM Security
SDN
Ngav / endpoint
Vulnerability
management
PATCH management
PAM
SESSION RECORDING
apt
Threat hunting
Dns security
Threat
intelligence
DECEPTION
DESIGN TRANSFORM SECURE
WAF
Application control
RASP
Mfa / 2FA
DAM
SAST / DAST
ERP Security CASB
DESIGN TRANSFORM SECURE
RECON STAGE LAUNCH EXPLOIT INSTALL CALLBACK PERSIST
target COMPROMISE BREACH
File
TrajectoryCyber kill chain
ATTACKER INFRASTRUCTURE FILES/PAYLOADS
SIEM 2.0
apt
Threat hunting
Dns security
Packet broker
NGFW P+V
Nips / Network AI
NAC
DDoS mitigation
DECEPTION
Email security
WAF Ngav / endpoint
Vulnerability
management
PAM
SESSION RECORDING
RASP
DAM
SIEM 2.0
Automated SECURITY
ANALYST – ARTIFICIAL
INTELLIGENCE
PATCH management
Application control
Mfa / 2FA
Email security
WAF
Packet broker
Ngav / endpoint
SIEM 2.0
Application control
web filtering
Threat
intelligence
apt
Dns security
Automated SECURITY
ANALYST – ARTIFICIAL
INTELLIGENCE
Cyber SECURE
DESIGN TRANSFORM SECURE
Technology partners – defense in depth
boldonjames
Cyber operations
§ Cyber security operations center
§ Security operations governance
§ Operating manuals
§ Siem 2.0 consulting and enhancement
§ Purple teaming
§ Threat modeling methodology
§ Mitre att&ck matrix detect
§ Threat adversary simulation - hunt
§ Use case development
§ Cyber threat intelligence
Cyber OPERATIONS
CSOCSTRATEGY
CSOCdesignandbuild
CSOCoperatingmodel
CSOCphysicallayout
SiemOperatingmanuals
Siemoptimizationandenhancement
Siemeffectivenessanalysis- purpleTEAMING
Threatmodelingmethodology
Networkarchitecturereview
Cyberattackkillchain
Mitreattackmatrix
Threatdetectionusecases
Usecasedevelopment
Incidentresponseplaybook
Cyberthreatintelligence
Opensourcethreatintelligence(OSINT)
Informationsharing
Brandreputation
Takedownservices
CSOCpolicies
CSOCprocesses
CSOC procedures
CSOCDESIGN&BUILD
CSOCGovernance
Siem2.0consulting
Surfaceattackanalysis
Threatintelligence
DESIGN TRANSFORM SECURE
Cyber response
§ Incident response (IR) program
§ IR governance & framework
§ Policies, processes and procedures
§ TOOLs / Tactics, techniques and procedures
§ Incident response playbooks
§ Mitre att&ck matrix response
§ Threat adversary simulation - hunt
§ Threat hunting methodology
§ Post-compromise assessment
§ Digital forensics
IRprogramdevelopment
Irgovernance&FRAMEWORK
IRPOLICIES, processesandprocedures
Irdigitalplaybooks
Securityorchestration&automationresponse(SOAR)
MITREATT&CKmatrixresponse
Threathuntingmethodology
Post-compromiseassessment
Digitalforensics
Networkforensics
Endpointforensics
Mobileforensics
Digitaltriageforensics
Irdatacollectiontoolkit
IRTACTICS, techniquesandprocedures
Incidentresponseprogram
Incidentresponsettp’s
Incidentresponse preparation
Preandpostcompromise
Digitalforensics
Cyber RESPONSE
DESIGN TRANSFORM SECURE
Cyber RESILIENCE
§ Cyber resilience assessment
§ RedteamING - Offensive
§ simulated targeted cyber attack
§ PURPLEteamING – RESPONSE
§ Simulated targeted cyber response
§ Cyber war-gaming
§ Table top exercises
§ Executive workshops
§ Management workshops
§ Technical workshops
Cyber RESILIENCE
DESIGN TRANSFORM SECURE
CASE STUDIES
DESIGN TRANSFORM SECURE
Let’s Talk?
Suite 61, Oasis Mall , Sheikh Zayed Road
Dubai, United Arab emirates
PO Box 128698
+971 43383365
800-hacked
info@dts-solution.com
www.dts-solution.com
Regus Business Center Suite 41, Defense Road
Abu Dhabi – United Arab Emirates
P.O. BOX 113678,
+971 43383365
800-hacked
info@dts-solution.com
www.dts-solution.com
160 Kemp House, City Road,
London, EC1V 2NX
UNITED KINGDOM
+44 2081230 387 (DTS)
info@dts-solution.co.UK
www.dts-solution.co.UK
Dubai ABU DHABI london
DESIGN TRANSFORM SECURE
Thank you
DESIGN TRANSFORM SECURE
Ad

More Related Content

What's hot (20)

Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
Eryk Budi Pratama
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
MetroStar
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Vigilant Software
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
Incident response
Incident responseIncident response
Incident response
Anshul Gupta
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
OxfordCambridge
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
Sam Bowne
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
Eryk Budi Pratama
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
MetroStar
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Vigilant Software
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
OxfordCambridge
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
Sam Bowne
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 

Similar to DTS Solution - Cyber Security Services Portfolio (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Cristian Garcia G.
 
Short story about your information processing - cloud part
Short story about your information processing -  cloud partShort story about your information processing -  cloud part
Short story about your information processing - cloud part
Artur Marek Maciąg
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINAL
Russ Dietz
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
RakeshKumar442494
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal
TI Safe
 
Clouds And Security
Clouds And SecurityClouds And Security
Clouds And Security
Predrag Mitrovic
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Vince Garr
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Cristian Garcia G.
 
Short story about your information processing - cloud part
Short story about your information processing -  cloud partShort story about your information processing -  cloud part
Short story about your information processing - cloud part
Artur Marek Maciąg
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINAL
Russ Dietz
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal
TI Safe
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Vince Garr
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Ad

More from Shah Sheikh (20)

ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Shah Sheikh
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
Shah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Shah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
Shah Sheikh
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Shah Sheikh
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
Shah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Shah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
Shah Sheikh
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Ad

Recently uploaded (19)

Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 

DTS Solution - Cyber Security Services Portfolio

  • 1. CYBER SSORR DTS 5 CORE domains DESIGN TRANSFORM SECURE Cyber Security services portfolio
  • 2. Chemicals Emergency Service Healthcare Electricity and Water Financial Services Nuclear Power Plants ICT Government ( Public Administration ) Transportation OIL AND GAS Cyber Security Challenges in Enterprises Today DESIGN TRANSFORM SECURE
  • 3. Cyber Strategy cyber Secure cyber Operations cyber response cyber resilience DESIGN TRANSFORM SECURE
  • 4. Cyber Strategy § Cyber Risk management § Security regulatory and compliance § Cyber transformation § Cyber security strategy § Cyber risk maturity assessment § Executive cyber dashboard § Cyber security metrics § Education, Training & awareness Cyber Strategy ISO27001:2013 PCI-DSSv3.2 SWIFTCSF IEC62443/ISA-99 Informationsecurityregulation- DUBAI Signalintelligence–nesaIAS–unitedArabemirates SaudiArabiamonetaryauthority - framework CLOUD MANAGEDSERVICES BLOCKCHAIN ARITICIALINTELLIGENCE BIGDATAANALYTICS FINTECH/IoT IDENTITYACCESS&MANAGEMENT DATAPROTECTIONPROGRAM 3-5yearcyberstrategy Cybersecurityroadmap Cybersecurityposture Enterprisecyberriskview Externalandinternalthreats Managementandtechnicalrisks Peopleprocessandtechnology Cybersecurityeffectivenessindex Securityawarenessindex Securitytrainingindex Securityincidentindex Year-on-yearriskratingindex Securityawarenessandtraining Technicalsecuritytraining Securitymarketingcampaigns Learningthroughgamification Securityawarenesseffectiveness CyberRiskmaturityrating Inherentcyberrisk Riskmaturityacrossdomains CyberRiskManagementFramework CyberRiskAssessment CyberRiskmanagement Securitycompliance Regulatoryandlegal Cybertransformation Strategy&roadmap Cybersecuritymaturity Executivedashboards Securitymetric Securityeducation DESIGN TRANSFORM SECURE
  • 5. Cyber SECURE Cyber SECURE § Redteam - Offensive § Blue team - defensive § Whiteteam - advisory Identityandaccessmanagement Dataprotectionprogram Cloudsecurityassessment Securityarchitecture Datacenterdesignandblueprint ADVISORY Vulnerabilityassessment Penetrationtesting Webapplication Mobileapplication Wirelesssecuritytesting Socialengineering Redteamingexercises Offensivesecurity Infrastructureprotection Networksecurityprotection Systemsecurityprotection Endpointsecurityprotection Applicationsecurityprotection Vulnerabilitymanagement Cloudsecurityprotection DEFENSIVEsecurity Cyber security for ot / ics Cybersecuritypoliciesinot/ics Cybersecurityoperationsinot/ics Icssystemsassetmanagement Cyberriskassessmentforics/scada Gap analysisforics/scada Otcyberresilience Otsecurityarchitecture Workforcedevelopment–cyber Controlsmapping–iec62443 Scada/otnetworktrafficanalysis Securityzoningandconduits Csocforot Otthreatintelligence Industrial security Oilandgas Power–utilities Nuclear Airportsandaviation Manufacturing Chemical Maritimeandtransportation experience TELCO security Ss7andsigtransecurity Mobilenetworksecurityarchitecture Networkelementsecuritytesting Minimumsecuritybaseline Iotandm2msecurity IPv6/DNS64security Nationwideanti-ddosmitigation TELCO security IOT, Cloud & big data security IOTsecuritycontrols Cloudsecuritycontrols Cloudsecurityassessment Cloudsecuritygovernance Cloudaccesssecuritybroker BigdataHadoop cybersecurity ElasticsearchlogStash&kibana- ELK Emerging tech Blockchain & fintech Smartcontractauditing applicationsecurityassessment DESIGN TRANSFORM SECURE
  • 6. Technology solutions – defense in depth Data classification DLP Data-in-transit Email security Dns security Packet broker web filtering SIEM 2.0 Policy compliance irp itsm Automated SECURITY ANALYST – ARTIFICIAL INTELLIGENCE wireless Captive portal MDM NGFW P+V Nips / Network AI SSL VPN NAC DDoS mitigation VM Security SDN Ngav / endpoint Vulnerability management PATCH management PAM SESSION RECORDING apt Threat hunting Dns security Threat intelligence DECEPTION DESIGN TRANSFORM SECURE WAF Application control RASP Mfa / 2FA DAM SAST / DAST ERP Security CASB
  • 7. DESIGN TRANSFORM SECURE RECON STAGE LAUNCH EXPLOIT INSTALL CALLBACK PERSIST target COMPROMISE BREACH File TrajectoryCyber kill chain ATTACKER INFRASTRUCTURE FILES/PAYLOADS SIEM 2.0 apt Threat hunting Dns security Packet broker NGFW P+V Nips / Network AI NAC DDoS mitigation DECEPTION Email security WAF Ngav / endpoint Vulnerability management PAM SESSION RECORDING RASP DAM SIEM 2.0 Automated SECURITY ANALYST – ARTIFICIAL INTELLIGENCE PATCH management Application control Mfa / 2FA Email security WAF Packet broker Ngav / endpoint SIEM 2.0 Application control web filtering Threat intelligence apt Dns security Automated SECURITY ANALYST – ARTIFICIAL INTELLIGENCE
  • 8. Cyber SECURE DESIGN TRANSFORM SECURE Technology partners – defense in depth boldonjames
  • 9. Cyber operations § Cyber security operations center § Security operations governance § Operating manuals § Siem 2.0 consulting and enhancement § Purple teaming § Threat modeling methodology § Mitre att&ck matrix detect § Threat adversary simulation - hunt § Use case development § Cyber threat intelligence Cyber OPERATIONS CSOCSTRATEGY CSOCdesignandbuild CSOCoperatingmodel CSOCphysicallayout SiemOperatingmanuals Siemoptimizationandenhancement Siemeffectivenessanalysis- purpleTEAMING Threatmodelingmethodology Networkarchitecturereview Cyberattackkillchain Mitreattackmatrix Threatdetectionusecases Usecasedevelopment Incidentresponseplaybook Cyberthreatintelligence Opensourcethreatintelligence(OSINT) Informationsharing Brandreputation Takedownservices CSOCpolicies CSOCprocesses CSOC procedures CSOCDESIGN&BUILD CSOCGovernance Siem2.0consulting Surfaceattackanalysis Threatintelligence DESIGN TRANSFORM SECURE
  • 10. Cyber response § Incident response (IR) program § IR governance & framework § Policies, processes and procedures § TOOLs / Tactics, techniques and procedures § Incident response playbooks § Mitre att&ck matrix response § Threat adversary simulation - hunt § Threat hunting methodology § Post-compromise assessment § Digital forensics IRprogramdevelopment Irgovernance&FRAMEWORK IRPOLICIES, processesandprocedures Irdigitalplaybooks Securityorchestration&automationresponse(SOAR) MITREATT&CKmatrixresponse Threathuntingmethodology Post-compromiseassessment Digitalforensics Networkforensics Endpointforensics Mobileforensics Digitaltriageforensics Irdatacollectiontoolkit IRTACTICS, techniquesandprocedures Incidentresponseprogram Incidentresponsettp’s Incidentresponse preparation Preandpostcompromise Digitalforensics Cyber RESPONSE DESIGN TRANSFORM SECURE
  • 11. Cyber RESILIENCE § Cyber resilience assessment § RedteamING - Offensive § simulated targeted cyber attack § PURPLEteamING – RESPONSE § Simulated targeted cyber response § Cyber war-gaming § Table top exercises § Executive workshops § Management workshops § Technical workshops Cyber RESILIENCE DESIGN TRANSFORM SECURE
  • 13. Let’s Talk? Suite 61, Oasis Mall , Sheikh Zayed Road Dubai, United Arab emirates PO Box 128698 +971 43383365 800-hacked [email protected] www.dts-solution.com Regus Business Center Suite 41, Defense Road Abu Dhabi – United Arab Emirates P.O. BOX 113678, +971 43383365 800-hacked [email protected] www.dts-solution.com 160 Kemp House, City Road, London, EC1V 2NX UNITED KINGDOM +44 2081230 387 (DTS) [email protected] www.dts-solution.co.UK Dubai ABU DHABI london DESIGN TRANSFORM SECURE