Family Office Alpha, Your Partner in Wealth through Cyber Defense
Rapid Diagnostic
Basic Cybersecurity Package
A great way to assess the current state of the organization and put together an action plan.
An initial meeting with Christopher Hetner, Former Senior Cybersecurity Advisor to the SEC Chair, Former US Treasury Senior Cyber Advisor & G-7 Cyber Expert and Cybersecurity Senior Executive Serving the 24,000 NACD Member Boardroom Community. Spend one hour to walk through the rapid, efficient diagnostic questionnaire to determine compliance with SEC cybersecurity regulations.
The second meeting with Christopher Hetner, Former Senior Cybersecurity Advisor to the SEC Chair. Discuss the results and lay out the next steps.
Advanced Cybersecurity Package
We work with family offices and RIAs to identify the type of cybersecurity package that is the best fit. Services include:
End point agent
24/7 monitoring
Basic firewall monitoring
Advance analytics and reporting
Enhanced identity and access management ID and governance
Access certifications and reviews
Incident response plan (customized)
vCISO
Comprehensive Cybersecurity Package
We work with family offices and RISs to identify the type of cybersecurity package that is the best fit. Our most comprehensive package include:
End point agent
24/7 monitoring
Basic firewall monitoring
Advanced analytics and reporting
Enhanced identity and access management ID and governance
Access certifications and reviews
Incident response plan (customized)
vCISO
Privileged identity management
Incident response management
Pen Testing
Threat hunting
A great way to strengthen the cybersecurity posture and put some basic protections into place.
Use abbreviated CIS Controls Framework, a model for codifying and promoting cybersecurity best practices by the Center for Internet Security, Inc. (CIS), to conduct the assessment. The CIS Controls Framework is the result of input from cybersecurity experts around the world.
Set up an end point agent that can monitor activity such as mouse movements, location data, and network context to help confirm a user's identity. If suspicious activity is detected, the agent can automatically alert the security team.
Implement 24/7 monitoring.
Implement basic firewall monitoring.