Cybersecurity Assessment Services
As ransomware attacks become more frequent and more sophisticated, this Schellman-specific service can help you develop a holistic risk assessment plan that specifically addresses the latest ransomware threats and mitigation strategies so that you can better safeguard your sensitive assets and demonstrate your preparedness.
Organizations everywhere are worried about ransomware and the potentially devastating fallout that comes with falling victim to an attack. While there are other security frameworks and standards that can help bolster your protections, at Schellman, we listened to the concerns of the market and our clients and customized assessment.
Solely focused on your risks pertaining to this particular attack, Ransomware Assessments evaluates both your prevention methods and your potential incident response so that you can strengthen your ransomware defenses from end to end.
Ransomware has struck all industries in recent years, but the resulting trends suggest that those in four sectors are at increased risk:
Every Ransomware Assessments engagement we perform will take a three-pronged approach to validate all aspects of your security against ransomware:
Kent Blackwell is a Director with Schellman's penetration testing team. Kent has over twelve years of experience serving clients in a multitude of industries, including the Department of Defense and top cloud service providers.
These evaluations fit into our greater Ransomware Assessments process which is comprised of six total phases that culminate in your final deliverable:
As part of our collaborative planning and preparation process, you’ll walk us through your environment as we use a Ransomware assessment toolkit to baseline your current capabilities.
We’ll perform penetration testing focused on the most common attack vectors for ransomware and applicable to your environment.
In addition to reviewing documented policies and procedures, we’ll either conduct ransomware training with your employees or simulate a purple team-style exercise to understand how your organization would respond to a ransomware attack.
When testing, training, and exercises are completed, we‘ll document our findings, including vulnerabilities and gaps in your response process.
After we provide you with our conclusions, you’ll have time to remediate any discovered gaps and make necessary improvements.
If you should request, we’ll perform a retest of the findings from penetration testing and provide an updated report. You do also have the option to add an external-facing report if you’d like to provide something to your customers.