Practice area

Cyber Defense

Cyber Defense

Uses knowledge of practical network attack tools and techniques to deliver an effective and sustainable defensive posture

Regain control of your network

Organizations constantly strive to prevent incidents occurring but should assume that eventual breach is inevitable. No large organization can implement 100 per cent security across the entire information systems estate. Cyber defense managers face a choice; spread protection thinly and ineffectively or focus on protecting the core assets.

Our Cyber Defense consultants have amassed expertise from a range of backgrounds that allow us to implement effective security within any organization. They leverage from MWR’s leading-edge research to shape an effective security posture at organizational level, developing solutions such as monitoring, attack detection and shaping overall security strategy. 

“We combine strategic thinking and technology expertise to deliver enhanced protection against all modern threats. Helping clients separate effective defensive measures from technology hype, we build a business case that proves the need to enhance defences.

Cyber Defense orchestrates delivery, ensuring that security investment translates into positive business outcomes right across your organisation.”

Andy Waugh, Cyber Defense Security Consultant, MWR

Core Solutions

Compromise Assessments

Establishes a cyber defense baseline or whether there's been a successful attack by detecting hidden malware and defining the extent of any breach.

Attack Path Mapping

Maps out the routes an attacker would take to reach your key business assets. This is essential for priority remedial work, detection strategy and response readiness.

Blue Teaming

Determines defensive maturity by replicating a range of attacks, thereby assessing the effectiveness of teams in your SOC.

Our thinking on Cyber Defense

Article

How understanding attackers can help keep you ahead of them

It is now widely accepted that detecting and responding to attacks is as important as preventing them but building an effective detection capability is not straightforward.

Article

Do you have all the logs you need?

Security Operation Centres rely solely on log data from various security controls for indicators of abnormal activity within the network. Without the correct logs, a SOC’s capabilities are limited. Does your SOC’s SIEM ingest the right logs?

Article

Cyber attack detection challenges and how to meet them

Article

A degree can start your career but doesn't dictate its path

Article

HackFu 2017: Cyber Corps victorious over rogue AI

 

Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by CESG for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.