More than another feed, our collection requirements are designed around your company.
Investigation
Specialized expertise in proactive hunts and investigations in the wake of an incident.
Starting a security program from scratch or improving existing policies around a framework.
Scenarios designed for your organization based on real-world threats with actionable results.
About us
Cybersecurity Innovation and Consultation
Union Cyber offers a suite of cybersecurity services rooted in experience from major industry and consulting firms. Need a service that doesn’t appear on the site? Reach out to us directly to see how we can help.
Cybersecurity Program Development
Resources and expertise for organizations of all sizes and at all levels of cybersecurity capability maturity
Security Operations Centers
Advisory services on processes, tooling, and staffing SOCs from strategy to implementation.
V-CISO
Developing and leading your organization’s security policies and programs.
Compliance Assessments
Align your organization with industry requirements, best practices, and standards. (NIST, ISO, SRG/STIG)
Insider Threat Management
Develop or mature your insider threat program, from risk assessments to remediation strategies.
Security Orchestration Advisory
Comprehensive workflow analysis and vendor-neutral suggestions for tooling
Fusion Centers
Integrate multiple security teams alongside critical business operations.
Union Cyber Threat Intelligence
Actionable Insights
Threat intelligence data that evolves with your organization. Give your security teams the advantage of knowing how adversaries are targeting your business and employees.
Customized Collection
Intelligence collection designed around your business allows you to see a unique view of your organization through the eyes of the adversaries.
Hybrid Source
Leverage both open and closed sources. Closed forums, continuous malware collection and analysis, and multiple web sources are all included.
Human Curated
Incorporate geopolitical intelligence, breaking news, and human sources to help understand adversary intent and motivation.
Machine Analyzed
Alert on the latest command and control servers, domain infringements, and other indicators of compromise.
Union Cyber Wargaming
Beyond “Can it happen to us?”
From a disgruntled insider deploying ransomware to your production and backup servers to advanced nation-state actors leveraging 0-day exploits to gain access to your network, Union Cyber can design scenarios based on your most critical needs and relevant concerns.
Scoping
Identify stakeholders and relevant scenarios based on applicable risk. Adjust the level of technical detail to best suit the most applicable teams.
Design
Leverage existing policies and playbooks in conjunction with case studies of real-world actors and their associated tactics, techniques, and procedures.
Execution
Key stakeholders respond to branching injects over a simulated or real-time period spanning from hours to weeks.
Improvement
Receive a detailed exercise debrief, policy gap analysis, and guidance on improving both infrastructure and policies.
Contact Us
Requests for quotes, questions about services, callback requests, and general inquires are all welcome.