fnCyber Threat Response Engineering Program is designed to aid the organizations to embark on a cybersecurity journey with a very high focus on the Enterprise Security Posture and also to mature those with an existing SOC Capability. Threats to any organization can only be dealt with strategic intent, and response to such threats can be handled only with a precise set of Tools, Techniques & Procedures and a detailed Threat Modelling based on organizational cybersecurity needs.
fnCyber Threat Response Engineering Program has a unique Integrated Dual Standard Approach combining Asset Protection Profiles with NIST Computer Security Incident Response Lifecycle to cater to such a high-profile uncompromising requirement. The benefit of such a model is a Response Guide based on Asset Protection Profiles with specific security properties and vulnerabilities that demand a unique response plan. A collection of such response guides make up a SOC-Knowledge Base unique to the organization; when practiced under a multi-mode simulation purposefully, it enhances SOC capability and throughput.
The Drill starts with evaluating and detailing the historical information, policies and procedures, reviewing the existing baselines and understanding SOC environment. The vanilla support model falls onto the proven NIST Incident Response Life Cycle. We take pride in practicing NIST SP 800-61r2, a Platinum Standard in Cyber Threat Response. Thereafter calibrate and enhance the SOC throughput leveraging fnCyber devised Resilience Triangle to Evaluate, Engineer and Organize.
fnCyber promotes a response plan based on the combination of Asset - Risk - Response. Evaluate existing IT Controls that offer a level of protection, helps lower the overall risk to the asset so it can fit into a standard incident response plan; alongside monitoring and alerting solution with an automated pre-configured response helps to lower the burden on SOC and straight away engages the SOC analyst to the Post-Incident Recovery. Next is to Engineer a Holistic SOC Capability and Preparedness based on Asset - Risk - Response and Protection Profiles with a fully evolved SOC-Knowledge Base. Thereafter organize enough resources to support the newly engineered SOC Model.