top of page

RISK & VULNERABILITY ASSESSMENT
Find and Fix
Identify and assess critical weaknesses in a security posture that adversaries can exploit to achieve intended consequences:
Review security plans to identify potential security weaknesses.
Develop tactical adversary attack scenarios that attempt to exploit identified security weaknesses.
Assess (via simulated exercise, modeling and simulation, or other assessment method) the extent to which the security system is able to defeat adversary attack scenarios.
Develop and assess potential mitigation options to improve security system performance and reduce or eliminate identified weaknesses
bottom of page