Attack
to Defend
By analyzing and simulating the most relevant attacks, Black Lantern Security delivers solutions that provide immediate reductions in organizational risk.
Black Lantern Security provides a complete suite of Offensive and Defensive Cybersecurity Services.
We foster an environment that demands exceptional integrity and challenges industry dogma. We deliver solutions that provide lasting value and will adapt and evolve with changing threats.
Assessments Completed
Published CVEs
Assets Defended
Our
Process
-
1. Define
-
What is the LIFEBLOOD of the business?
-
Where are the CROWN JEWELS?
-
Which workflows are the primary drivers for PROFIT, REVENUE, and CASHFLOW?
-
Where is the critical DATA? BLS is dedicated to understanding the ENTIRE organization.
-
-
2. Assess
-
Which Information Technology (IT) assets support critical business workflows?
-
Are they VULNERABLE?
-
How are they DEFENDED? BLS will work to profile and assess critical business applications and services.
-
-
3. Attack
-
Can critical assets WITHSTAND an attack?
-
BLS works to emulate attacker tactics, techniques, and procedures (TTPs) that the organization is most likely to face based on current threat intelligence.
-
-
4. Quantify
-
What were the FINANCIAL IMPACTS of the attacks?
-
Was critical data exfiltrated?
-
Were critical applications taken offline? If so, for how long?
-
What is the ACTUAL COST of a security incident or breach?
-
-
5. Verify
-
Were host-, network-, application-, and email-based defenses adequate and effective?
-
Which attacks were detected, prevented, or altogether missed?
-
By emulating multiple classes of attacker, BLS VERIFIES and VALIDATES existing controls.
-
-
6. Identify
-
Are there STRATEGIC or TACTICAL gaps in the organization’s defenses?
-
Can the defensive posture be improved with minor configuration changes and targeted tuning or is there a larger problem?
-
BLS will work with the organization to develop and define remediations commensurate with RISK and COST.
-
-
7. Remediate
-
BLS will provide actionable findings with detailed remediation guidance. This could include anything from a small change to a configuration file to a significant change in the network architecture.
-
BLS is dedicated to helping you implement fixes, REDUCE risk, and DRIVE DOWN the COST of a security incident or breach.
-
Let Us be Your Trusted Advisor
Get tailored cybersecurity services, tools, and products to safeguard your business.