Family Office Alpha, Your Partner in Wealth through Cyber Defense

Rapid Diagnostic

Basic Cybersecurity Package

A great way to assess the current state of the organization and put together an action plan.

  • An initial meeting with Christopher Hetner, Former Senior Cybersecurity Advisor to the SEC Chair, Former US Treasury Senior Cyber Advisor & G-7 Cyber Expert and Cybersecurity Senior Executive Serving the 24,000 NACD Member Boardroom Community. Spend one hour to walk through the rapid, efficient diagnostic questionnaire to determine compliance with SEC cybersecurity regulations.

  • The second meeting with Christopher Hetner, Former Senior Cybersecurity Advisor to the SEC Chair. Discuss the results and lay out the next steps.

Advanced Cybersecurity Package

We work with family offices and RIAs to identify the type of cybersecurity package that is the best fit. Services include:

  • End point agent

  • 24/7 monitoring

  • Basic firewall monitoring

  • Advance analytics and reporting

  • Enhanced identity and access management ID and governance

  • Access certifications and reviews

  • Incident response plan (customized)

  • vCISO

Comprehensive Cybersecurity Package

We work with family offices and RISs to identify the type of cybersecurity package that is the best fit. Our most comprehensive package include:

  • End point agent

  • 24/7 monitoring

  • Basic firewall monitoring

  • Advanced analytics and reporting

  • Enhanced identity and access management ID and governance

  • Access certifications and reviews

  • Incident response plan (customized)

  • vCISO

  • Privileged identity management

  • Incident response management

  • Pen Testing

  • Threat hunting

A great way to strengthen the cybersecurity posture and put some basic protections into place.

  • Use abbreviated CIS Controls Framework, a model for codifying and promoting cybersecurity best practices by the Center for Internet Security, Inc. (CIS), to conduct the assessment. The CIS Controls Framework is the result of input from cybersecurity experts around the world.

  • Set up an end point agent that can monitor activity such as mouse movements, location data, and network context to help confirm a user's identity. If suspicious activity is detected, the agent can automatically alert the security team.

  • Implement 24/7 monitoring.

  • Implement basic firewall monitoring.