Because Time is Money
280 days* of an undetected cyber attack and inactiongives attackers time to complete their mission – data exfiltration, access passwords, install ransomware and impact your business operations. If you could decrease that time by 99%, would you? THREAT HUNTING & MANAGEMENT: At Your Service
Mitigate your risk by reducing the average time to identify and contain breaches to less than 2 business days by proactively monitoring, alerting, and blocking improper access, malicious behaviors, and programs attacking your internal and external resources.
COMPREHENSIVE MANAGEMENT: Covering all Bases
- Detect attacks
- Contain threats
- Reduce Mean Time to Identify (MTTI) and Mean Time to Contain (MTTC)
From threat tools, tool configuration, implementation counseling and advisory, threat monitoring reports, incident response and forensics support – get the threat management resources specific for you unique working environment. We partner with you to set the right threat strategy, because we understand what your time is worth. Schedule an advisory session.
Reasonable Security is Now Defined
The Sedona Conference – an influential think tank that advices attorneys, regulators, and judges on challenging technical matters – just released its Commentary on a Reasonable Security Test. The Commentary is the first document of its kind that provides the legal community with a clear definition of a “reasonable” security control.
HALOCK’s Chris Cronin was a co-author of Commentary on a Reasonable Security Test. To learn how to apply the test, contact us.
HALOCK is a trusted cyber security company headquartered in Schaumburg, IL, in the Chicago area and advises clients on reasonable information security strategies, risk assessments, penetration testing services, security management and architecture reviews, and compliance throughout the US.
As principal authors of CIS Risk Assessment Method (RAM) and board members of The Duty of Care Risk Analysis (DoCRA) Council, HALOCK offers the unique insight to help organizations define their acceptable level of risk and establish “duty of care” for cybersecurity. Through this risk assessment method, businesses can evaluate cyber risk that is clear to legal authorities, regulators, executives, lay people, and security practitioners.
HALOCK partners with you to establish reasonable security controls based on your organization’s mission, objectives and social responsibility.
*Ponemon Institute/ IBM Cost of a Data Breach – 2020