Advanced Cyber Risk

Be Ready for Your Attacker's Next Move

CrossCountry Consulting’s Advanced Cyber Risk team focuses on sophisticated threat actors such as cybercrime groups and state-sponsored attackers: our offensive security team emulates the attacks of the threat actors, helping clients learn where they are vulnerable and how these weaknesses can be fixed to become strengths; the threat intelligence team concentrates on knowing these actors, their history, their capabilities, and their motivations; and the threat modeling team anticipates the future actions of the threat actors and how they would fare against your security controls.

Offensive Security Testing

CrossCountry has a highly skilled and experienced team that specializes in emulating the tactics, techniques, and procedures of today’s threat actors.

An Adversary Emulation exercise is our most realistic and advanced option. It demonstrates a sophisticated threat actor targeting your organization and pursues the threat actor’s likely objective.

  • Emulates the tactics, techniques, and procedures of a sophisticated adversary
  • Leverages threat intelligence to determine the most likely threat actors targeting your organization and works with you to select the emulated adversary and objective
  • Mimics the adversary’s behavior, including obtaining an initial foothold, stealthily moving through the network, and achieving the emulated adversary’s objective, such as compromising intellectual property or money movement

Learn More

A Red Team exercise tests your organization’s ability to detect a stealthy attacker before they are able to gain control of your network.

  • Similar to Adversary Emulation, but reduces cost by excluding the emulation of a specific adversary and the pursuit of the adversary’s objective
  • Attempts to enter the target network and gain pervasive access of the target environment (e.g., “Domain Administrator” privileges) while evading detection

 

Learn More

A Purple Team exercise provides opportunities for your defenders to practice defeating an adversary’s actions.

  • A Purple Team exercise is a collaboration between Red Team attackers and Blue Team defenders
  • Uses regular feedback from CrossCountry’s Red Team that focuses on the data most relevant to detecting, responding to, and evicting attackers
  • Offers an annual, subscription-based service that provides multiple scenarios throughout the year; point-in-time exercises are also optional

 

Learn More

As a “white box” approach to security testing, the goal of a Penetration Test is to find as many vulnerabilities as possible and provide recommendations for remediation.

  • Includes external network, internal network, web application, mobile application, wireless, blockchain, physical entry, and/ or phishing exercise
  • Leverages vulnerability scanning and manual verification of detected vulnerabilities to eliminate false positives

 

Learn More

Threat Intelligence

Threat Intelligence allows for the development or implementation of proactive defensive measures and improved response actions to enhance security posture.

1. Discover

Attain a deep understanding of threats and events affecting your organization and industry to include adversaries operating in the deep/ dark web.

2. Build

Create a fully operational and self-sustaining intelligence program that moves your security posture from reactive to proactive, as well as a tight integration with the SOC and other security teams.

3. Assess

Enhance existing intelligence capability (if your enterprise already has an intelligence capability) and keep pace with the dynamic threat and security landscape.

4. Manage

Augment your security staff for routine or ad-hoc intelligence support based on intelligence requirements or custom requests.

Threat Modeling

CrossCountry has developed a systematic approach to threat modeling that helps you understand the threat actors targeting your organization. Our approach assesses the likelihood of each threat actor to target your organization, how well your security program counteracts those threats, and identifies areas for improvement.

Our approach is based on the attack chain principle and incorporates industry best practices, to include the MITRE ATT&CK framework, NIST 800-53, and Lockheed Martin’s Cyber Kill Chain. The outcomes of threat modeling, through collective wargaming, are evidence-based actions that strengthen the organizational security posture. Throughout the project, we train your staff to keep up with ever-changing threat landscape.

Meet Our Advanced Cyber Risk Leadership Team

Image is not available

Cameron Over

Partner

Cyber & Privacy

Image is not available

Eric Eames

Advanced Cyber Risk Lead

Cyber & Privacy

Image is not available

Jim Wellington

Director

Cyber & Privacy

Slider