Review existing documentation
Unit 42 will develop an understanding of your processes, tools and capabilities while identifying gaps in security control design.
Basic Assessment
Advanced Assessment
Most Comprehensive
TIER 1 | TIER 2 | TIER 3 | |
---|---|---|---|
Readiness Findings and Recommendations Report |
|
|
|
Ransomware Threat Briefing |
|
|
|
Ransomware Tabletop Exercise |
|
|
|
50 Credits Reserved for Incident Response |
|
|
|
Ransomware Compromise Assessment with Cortex XDR |
–
|
|
|
Purple Team Ransomware Campaign |
–
|
–
|
|
Executive / Board Advisory Briefing |
–
|
–
|
|
Readiness Findings and Recommendations Report
|
|
---|---|
Ransomware Threat Briefing
|
|
Ransomware Tabletop Exercise
|
|
50 Credits Reserved for Incident Response
|
|
Ransomware Compromise Assessment with Cortex XDR
|
–
|
Purple Team Ransomware Campaign
|
–
|
Executive / Board Advisory Briefing
|
–
|
Readiness Findings and Recommendations Report
|
|
---|---|
Ransomware Threat Briefing
|
|
Ransomware Tabletop Exercise
|
|
50 Credits Reserved for Incident Response
|
|
Ransomware Compromise Assessment with Cortex XDR
|
|
Purple Team Ransomware Campaign
|
–
|
Executive / Board Advisory Briefing
|
–
|
Readiness Findings and Recommendations Report
|
|
---|---|
Ransomware Threat Briefing
|
|
Ransomware Tabletop Exercise
|
|
50 Credits Reserved for Incident Response
|
|
Ransomware Compromise Assessment with Cortex XDR
|
|
Purple Team Ransomware Campaign
|
|
Executive / Board Advisory Briefing
|
|
Unit 42 will develop an understanding of your processes, tools and capabilities while identifying gaps in security control design.
Unit 42 will interview your key stakeholders to gain additional insight into security control deployment and technical capabilities.
Unit 42 will design and manage a ransomware Tabletop Exercise to test your IR processes, tools and internal knowledge.
Our threat hunters will search for indicators of unauthorized access, data exfiltration, lateral movement, malicious file execution and persistence.
Unit 42 experts will attempt to bypass your security controls by leveraging tools and techniques common in ransomware attacks.
You will receive a detailed technical report including security risks with prioritized recommendations to guide your efforts.