More than another feed, our collection requirements are designed around your company.

Investigation

Specialized expertise in proactive hunts and investigations in the wake of an incident.

Starting a security program from scratch or improving existing policies around a framework.

Scenarios designed for your organization based on real-world threats with actionable results.

About us

Cybersecurity Innovation and Consultation

Union Cyber offers a suite of cybersecurity services rooted in experience from major industry and consulting firms. Need a service that doesn’t appear on the site? Reach out to us directly to see how we can help.

Cybersecurity Program Development

Resources and expertise for organizations of all sizes and at all levels of cybersecurity capability maturity

Security Operations Centers

Advisory services on processes, tooling, and staffing SOCs from strategy to implementation.

V-CISO

Developing and leading your organization’s security policies and programs. 

Compliance Assessments

Align your organization with industry requirements, best practices, and standards. (NIST, ISO, SRG/STIG)

Insider Threat Management

Develop or mature your insider threat program, from risk assessments to remediation strategies.

Security Orchestration Advisory

Comprehensive workflow analysis and vendor-neutral suggestions for tooling

Fusion Centers

Integrate multiple security teams alongside critical business operations.

Union Cyber Threat Intelligence

Actionable Insights

Threat intelligence data that evolves with your organization.  Give your security teams the advantage of knowing how adversaries are targeting your business and employees.

Customized Collection

Intelligence collection designed around your business allows you to see a unique view of your organization through the eyes of the adversaries.

Hybrid Source

Leverage both open and closed sources. Closed forums, continuous malware collection and analysis, and multiple web sources are all included.

Human Curated

Incorporate geopolitical intelligence, breaking news, and human sources to help understand adversary intent and motivation.

Machine Analyzed

Alert on the latest command and control servers, domain infringements, and other indicators of compromise.

Union Cyber Wargaming

Beyond “Can it happen to us?”

From a disgruntled insider deploying ransomware to your production and backup servers to advanced nation-state actors leveraging 0-day exploits to gain access to your network, Union Cyber can design scenarios based on your most critical needs and relevant concerns.

Scoping

Identify stakeholders and relevant scenarios based on applicable risk. Adjust the level of technical detail to best suit the most applicable teams.

Design

Leverage existing policies and playbooks in conjunction with case studies of real-world actors and their associated tactics, techniques, and procedures.

Execution

Key stakeholders respond to branching injects over a simulated or real-time period spanning from hours to weeks.

Improvement

Receive a detailed exercise debrief, policy gap analysis, and guidance on improving both infrastructure and policies.

Contact Us

Requests for quotes, questions about services, callback requests, and general inquires are all welcome.