top of page
Broken steel chain.jpg


Find and Fix

Identify and assess critical weaknesses in a security posture that adversaries can exploit to achieve intended consequences:

  • Review security plans to identify potential security weaknesses.

  • Develop tactical adversary attack scenarios that attempt to exploit identified security weaknesses.

  • Assess (via simulated exercise, modeling and simulation, or other assessment method) the extent to which the security system is able to defeat adversary attack scenarios.

  • Develop and assess potential mitigation options to improve security system performance and reduce or eliminate identified weaknesses

bottom of page