Shiltron
Home
Services
Contact Us
About Us
Privacy Policy
Shiltron
Home
Services
Contact Us
About Us
Privacy Policy
More
  • Home
  • Services
  • Contact Us
  • About Us
  • Privacy Policy
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services
  • Contact Us
  • About Us
  • Privacy Policy

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Some of Our Services

Roundtables

  Shiltron facilitates discussions, seminars, and collaborative problem solving/brainstorming for your personnel. These are NOT lectures: we guide an engaging forum to maximize value added to your organization's information security posture. Potential topics include:


  • Industry-wide threat trends
  • Operational security (OPSEC)
  • Identifying potential organizational information targets
  • Defense-in-depth InfoSec considerations
  • Information security management and administration

Open Source/Public Information Exposure Check

  Individual pieces or sets of publicly-available information and/or data may be benign; when aggregated, such exposures could be used to exploit your organization's sensitive information - or potentially threaten the safety of your assets and personnel.


  Shiltron maintains robust Open Source Intelligence (OSINT) capability including web scraping/data mining and analysis. We gauge your open source/public information exposure for a low-risk, high-reward addition to your organization's current risk management.

Information Vulnerability Assessments (IVA)

  Shiltron provides a range of evaluations of information security systems, processes, or infrastructure of any type or discipline. Some of our IVA services include: 


  • Multi-discipline vulnerabilities chaining exploitability
  • Baseline and periodic facility electromagnetic spectrum (EMS) analysis
  • Unauthorized unmanned systems susceptibility
  • Rogue RF-emanating device detection
  • IT infrastructure/hardware physical access control
  • Resilience of IOT/IIOT, Industrial Control Systems (M2M, SCADA, DCS), Electronic Surveillance Systems (IDS, VSS/CCTV, PACS), etc.
  • Potential insider threat vectors
  • Information security program review

Exercises

   Observe in real time how your organizational layered security reacts real time in a controlled environment. Shiltron develops and conducts exercises to provide realistic scenarios and actionable feedback to help you better appraise the effectiveness of your organizational information security. 


  Whether tabletop discussion-based or practical/field operations-based, we work through the entire exercise process with you: from planning and execution, to feedback and improvement.


  

Threat Modeling and Simulation

  Shiltron offers a flexible range of threat modeling and simulation capabilities. We can realistically mimic threats from basic criminal and malicious actions to high-leverage complex exploitation operations.


  Shiltron tailors and executes a comprehensive test of your organizational information security to identify strengths and/or potential vulnerabilities.


  • Synthesized Threat Actions
  • Red Teaming
  • Shiltron's Targeted Exploitations Assessment Mechanism (TEAM)


  A step beyond exercises, Shiltron's threat simulation and modeling observe your organization's security response. You define the nature of the threat and Shiltron executes the threat actions while you await the results.

  

Advisor Services

  Shiltron consultants advise and guide your information security personnel through a range of information security administration and management:


  • Information Security Risk Management
  • Incident Response and Continuity of Operations Plans
  • Information Security Program Development and Implementation
  • Industry Standards Alignment

Additional Services

  Shiltron is highly adaptable and will work to meet your unique information security needs. We maintain a robust set of organic capabilities to provide a broad range of additional services. Contact us today to discuss your InfoSec concerns and how Shiltron can help!

Connect

In theory there is no difference between theory and practice. In practice there is.


Disputed

  • Client Links

Copyright © 2024 Shiltron - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept