Cyber Defense Assessment

Assess your ability to effectively detect and respond to evolving cyber attacks in today's modern landscape.

Assess. Exercise. Validate.

The Mandiant Cyber Defense Assessment is designed for organizations looking to build a new cyber defense function from the ground up, enhance their existing processes and technology, and effectively measure their program performance against sophisticated real-world attacks.

This service is driven by frontline expertise, and performs the following best-practice actions:

  • Documentation review of incident response, threat hunting, and threat intelligence playbooks
  • Cyber defense workshops and skills matrix exercises with internal stakeholders to understand people, process, and technology capabilities
  • Analysis of critical log samples to validate configurations for effective threat detection and response
  • Tabletop exercises to assess end-to-end response actions and incident-related decision-making
  • Simulated attacks to evaluate effectiveness of threat detection controls mapped against the MITRE ATT&CK framework

Get the most out of your assessment

With differences in size, maturity, and business goals, what your organization needs may not be the same as another. Work with Mandiant consultants to decide which of our three assessment tiers fit your organizational needs. It typically takes 4-6 weeks to complete the engagement, which includes the following deliverables:

  • Implementation recommendations to help build or improve your program (all tiers)
  • Detailed technical briefing that identifies program gaps and weaknesses (all tiers)
  • Actionable roadmap of prioritized improvement initiatives (tiers II and III)
  • Executive briefing with strategic recommendations (tiers II and III)

Amplify all areas of your cyber defense

The Mandiant Cyber Defense Assessment evaluates your organization's approach to and activation of the six critical functions of cyber defense, which have been identified as foundational blocks for an effective security program.

Threat intelligence

Insights into attacker tactics, techniques, and proTPs, their targets, and their motivations to help uncover vulnerabilities in a specific environment. 

Hunt

Help in identifying potential evidence of an active or previous compromise within an environment.

Detect

Identification and prioritization of malicious behavior based on specific alert activity and observations.

Respond

Threat response and compromise remediation within an organization's environment.

Validate

Providing assurance that the security control ecosystem is operating as expected and protecting critical assets.

Command and control

Mission maintenance and orchestration of the flow between all critical functions to properly prioritize cyber defense resources.

Gain a stronger security posture

The Cyber Defense Assessment was made to give you the knowledge needed to better prepare for and handle incidents that come your way. Mandiant experts are ready to help you:

  • Evaluate your cyber defense program across the six critical functions
  • Customize service delivery to meet your organization's specific needs 
  • Identify your cyber defense capability weaknesses and program gaps
  • Help improve your overall detection and prevention capabilities against evolving threats
  • Build or enhance your cyber defense program to help achieve security resilience

Learn about The Defender's Advantage

Understand how to optimize and activate the six critical functions of cyber defense.
Rate and measure your existing capabilities across the six critical functions of cyber defense.
Google Cloud
  • ‪English‬
  • ‪Deutsch‬
  • ‪Español‬
  • ‪Español (Latinoamérica)‬
  • ‪Français‬
  • ‪Indonesia‬
  • ‪Italiano‬
  • ‪Português (Brasil)‬
  • ‪简体中文‬
  • ‪繁體中文‬
  • ‪日本語‬
  • ‪한국어‬
Console
Google Cloud