Current Services
Security Seminars
Security seminars are in-person half-day events held in the San Diego County region. The seminar is intended to be an introduction to cybersecurity, broken into three sections: a threat briefing, security best practices, and time to review FAQs & with live Q&A. The content delivered is family friendly and geared toward individuals actively using the Internet for personal reasons. This seminar is about you: what you need to know, how you should manage your security, what you can do individually and personally.
Seminar pricing is subject to the estimated number of attendees and fees charged by the venue owner, but we seek to limit attendance fees to $200 for an individual, $225 for couples or pairs, $250 per family. Technical seminars that cover similar material will often charge $500-$1500 for each recipient. Our mission is to reach families, so we seek to make these seminars as affordable as possible without compromising the value.
Introduction
At the start of the seminar you will be introduced to the speaker and guidance for the day will be shared.
Session 1: Threat Briefing
The first formal session of the seminar will introduce you to the world of cybercrime as we explore the threats and the risks we face. We will discuss the size and scope of the criminal underground, we will review the profile and motivations of criminals and other cyber threat actors, and you will be provided with an overview of their most common techniques, tools, and procedures.
Our goal is that you will leave this session with a basic understanding of cybercrime, the risk to you, and the impact that is having on all of us.
Session 2: Best Practices for Individuals
During session 2 we will build upon the Threat Briefing and discuss countermeasures we can employ to defend against the threat actors we face. This will include a blend of mindset, strategy, and practical actions you need to adopt in your personal defense. Specific tools and recommendations will be shared for those who are looking for help making the most practical decisions.
Session 3: Best Practices for Home
In session 3 the countermeasures discussion takes a look at how you can secure your home; that is the network and Internet connected devices within your residence, as well as extending security to anyone who is using your home resources to connect to the Internet. We will discuss home network technology, configurations, and additional resources to leverage that will keep you and yours safe.
This session will heavily focus on the head of the household and parents, to ensure you are taking all the prudent steps to shield your children.
Session 4: FAQs & Q&A
The final session of the seminar will include a chance for attendees to pose questions live and get the presenter’s quick feedback and thoughts on any subject relevant to the material of the day or to cybersecurity in general. The Q&A experience will be capped with a time limit, so it is best to come prepared with your most pressing questions.
Security Assessments
Primarily designed for small businesses or organizations operating in a similar context, our Security Assessment service is designed to construct a security review specific to your organization’s unique profile and needs.
The assessment starts with interviewing key staff to understand your business and it’s position relative to threats and industry regulations or best practices. This will enable the assessment team to identify the right caliber of security program that is ideal for you.
We will review your people, process, and technology and compare what you have in place to what we believe is necessary for an effective defense posture.
We will also provide a custom tailored threat briefing to your staff in a mini-seminar, to ensure your front-line defenders understand the context of the cyber battlefield. This briefing will provide practical examples of what you should expect from cyber attacks, how to mitigate or prevent their impact, and what to do in the event a compromise occurs.
Security Assessments are typically one week engagements although they can be split across time to accommodate business schedules and staff availability. At the conclusion of the assessment, you will be provided:
A threat profile that outlines the scope of cybersecurity concerns that relate to your organization.
A copy of the threat briefing delivered to your staff.
The results of the assessment including strengths and weaknesses, and recommendations for improvement.
An overall security strategy that can be adopted by your organization for planning purposes.
Smaller scale security assessments can be provided for individuals or families as needed. These are scoped on an as-needed basis and may include any feature of the Standard Security Assessment.
Advisories and Tips
The threat landscape is constantly evolving. There are always new threats that are surprising people and with them new questions that arise. Can I trust this email? Can I trust this app? Is this text message legitimate? Should I choose Apple or Microsoft? Is iPhone iOS or Android more secure? Do I really need AntiVirus? What product works best? What is a VPN? Is Social Media safe for my teen?
These are some of the many questions we receive on a regular basis. The Practive Security Advisories and Tips service is a members-only subscription to a library of articles we publish that answer these and many other security related questions. New content is published regularly and subscribers can submit their own questions for consideration in a future advisory or tip.
Retainer for consulting
For premium subscribers we offer a consulting retainer service where customers purchase dedicated support for a negotiated period of time, in hours. These consulting hours can be used on-demand for the duration of time available, and can be used for a broad scope of work or scenarios. Customers needing on-demand consulting may need:
Guidance to help build security strategy
Help solving specific security problems
Evaluating and selecting security hardware or software solutions
Defining security-related job descriptions and interviewing candidates
Specific technology reviews
Process or procedure writing (such as detection use cases, or incident response plans, or investigation standards to name a few examples)
Security training for staff
Support during an audit
Executive briefings
Organization guidance for security programs