Practice area

Cyber Defense

Cyber Defense

Uses knowledge of practical network attack tools and techniques to deliver an effective and sustainable defensive posture

Regain control of your network

Organizations constantly strive to prevent incidents occurring but should assume that eventual breach is inevitable. No large organization can implement 100 per cent security across the entire information systems estate. Cyber defense managers face a choice; spread protection thinly and ineffectively or focus on protecting the core assets.

Our Cyber Defense consultants have amassed expertise from a range of backgrounds that allow us to implement effective security within any organization. They leverage from MWR’s leading-edge research to shape an effective security posture at organizational level, developing solutions such as monitoring, attack detection and shaping overall security strategy. 

“We combine strategic thinking and technology expertise to deliver enhanced protection against all modern threats. Helping clients separate effective defensive measures from technology hype, we build a business case that proves the need to enhance defences.

Cyber Defense orchestrates delivery, ensuring that security investment translates into positive business outcomes right across your organisation.”

Andy Waugh, Cyber Defense Security Consultant, MWR

Core Solutions

Compromise Assessments

Establishes a cyber defense baseline or whether there's been a successful attack by detecting hidden malware and defining the extent of any breach.

Attack Path Mapping

Maps out the routes an attacker would take to reach your key business assets. This is essential for priority remedial work, detection strategy and response readiness.

Blue Teaming

Determines defensive maturity by replicating a range of attacks, thereby assessing the effectiveness of teams in your SOC.

Our thinking on Cyber Defense

Article

Riddle me this: Detecting indirect attacks

Whitepaper

Machine learning: A Threat-hunting reality check

Article

Getting the best ROI on asset protection

Article

Linux-targeted KillDisk may use ransomware to hide true purpose

Article

A well-placed confidence in security training

 

Accreditations

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 14001 in the UK, an internationally accepted standard that outlines how to put an effective environmental management system in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR are approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by CESG for the services we provide to Her Majesty's Government.
As a Certified Simulated Attack Manager and Certified Simulated Attack Specialist, MWR are authorized by CREST to perform STAR penetration testing services.