Computer Crime, Cyberterrorism, and Law Enforcement
When: April 2, 2003
Where: San Diego, CA
PSI: Panelist

Download PSI Presentations from upcoming or past events.

Big news coming!!
Keep checking back to see what's new with PSI!


Press Release 03/11/03:
Practical Security Inc Releases
Paper Discussing Final HIPAA
Security Rule

Press Release 02/19/03:
PSI and SHP Form Alliance to Provide HIPAA Certification Support Services to the Healthcare Industry

Published Article: Information Security Magazine, February 2003:
"Talk the Talk, Walk the Walk: Five Tips to Win Friends and Influence C-Level Execs in Your Organization

 


Congratulations to our March book winner: Martin Fink of Federal Reserve Bank of NY

Signup here to register to win!

Assessment Services | Security Training | Security System Integration |
HIPAA Services
| Executive Services

Assessment Services

Assessments are an important part of understanding how well prepared your organization is to deal with threats. There are several types of assessments including security posture assessments, vulnerability assessments, penetration tests, resource classification, and policy design and reviews. PSI offers two assessment packages designed to get your organization up to speed quickly and improve overall security. PSI can also customize any assessment to fit the needs of your organization.

Security Posture Assessment Package I
This package includes 1 day on-site, a network vulnerability assessment of up to 100 addresses, a preliminary security posture assessment and resource classification, a final report, and a 1-day web review of results and recommendations.

Security Posture Assessment Package II
This package includes 5 days on-site, a network vulnerability assessment of up to 256 addresses, a security posture assessment and resource classification, a final report, and a 1-day on-site review of results and recommendations.

Security Audit
PSI will determine your compliance with security policies, standards and guidelines appropriate to your industry or organizational specific requirements. This custom audit includes a resource classification to positively identify the mission critical computers and data in your enterprise. It also includes a review of communications and network architecture to determine weaknesses. PSI will recommend controls and protective measures to mitigate identified weaknesses.

Vulnerability Assessment
Technology research firm Gartner estimated recently that through 2005, 90 percent of computer attacks will use known security flaws for which a solution is available. A vulnerability assessment is an internal or external scan of systems to identify hundreds of known vulnerabilities that can be easily corrected. PSI will scan your systems and help you fix known vulnerabilities. This service is offered as a subscription to keep your systems up-to-date and protected.

Penetration Test
Penetration testing is another level of assessing the security of your systems. Beyond a simple scan, a penetration test is a multi-step process using zero knowledge, partial knowledge, and full knowledge techniques to break into your systems the same way a hacker or insider would. These steps include mapping network elements to business function, exploiting vulnerabilities to measure effectiveness, and social engineering to test security procedures. A "pen-test" helps measure the human side of security and is a more effective measure of real risk.

Data Forensics / Incident Response
Sometimes you need to call in experts after youšve experienced an attack or you think you may have experienced a loss due to computer crime. PSI can help you gather and protect evidence for prosecution, perform damage assessment to determine what was compromised, identify perpetrators, and determine exactly what happened so that it wonšt happen again.

Certification and Accreditation
If your industry is subject to government regulation such as health care, banking and finance, or a civil agency then your systems may require certification and accreditation against a myriad of shifting criteria. PSI can help you determine the applicable regulations, review your systems against the criteria, and make corrective suggestions to pass accreditation.

Requirements Analysis / Product Selection / Integration
The best way to select the best security product is to use your own environment-specific requirements as your guide. Requirements analysis and product selection go hand-in-hand. PSI will help you understand your requirements and match product capabilities to find the best choice for you in firewalls, authentication, and intrusion detection. PSI can then help you integrate and deploy your products.

Assessment
Services


Security Posture Assessment Package I

Security Posture Assessment Package II

Security Audit

Vulnerability Assessment

Penetration Test

Data Forensics / Incident Response

Certification and Accreditation

Requirements Analysis / Product Selection / Integration


Contact us
for a quote