We Offer What???
IP Protection
Zero Trust
GRC
Offensive Security
100

Christian hates using this term when describing our offensive security

What is Penetration Testing


100

A strategic approach that maps and assesses intellectual property to determine where and how it's at risk. 

What is IP Data Mapping & Risk Assessments

100

This model assumes no one inside or outside the network is trusted and requires verification at every access point.

What is Zero Trust Architecture Design & Implementation?

100

This process assesses the risks posed by vendors and partners to your organization’s cybersecurity posture.

What is Third Party Risk Analysis?

100

Offensive Security involves simulating real-world attacks. This testing "technique" helps an organization test its ability to detect and respond to persistent threats over time.

What is Red Teaming?

200

This type of assessment is unique in that it analyzes both the technical/security posture along with the business/financial objectives

What is a Security Rationalization Assessment 
200

This solution prevents sensitive data from being accidentally or maliciously shared outside of authorized channels.

What is Data Loss Prevention (DLP)

200

A solution that provides secure, identity-based remote access to applications without exposing the network.

What is Zero Trust Network Access (ZTNA)?

200

These internationally recognized frameworks guide organizations in managing information security effectively. Name 3

Name 3 - What are ISO27001, SOC2, CMMC, NIST 800-171 or 53, FedRAMP, FISMA, PCI-DSS, HIPAA, SEC, and SOX?

200

This type of Penetration Testing focuses on exposing weaknesses in websites and online services.

What is Web Application Penetration Testing?

300

This program offers vCISOs, Business Advisors, etc the opportunity to earn very lucrative referral fees upwards of 20% for PLCS services. 

What is our Plurilock Sales Agent Program

300

This practice involves analyzing the vulnerabilities in your suppliers and distributors to safeguard intellectual property.

What is Supply Chain Security Analysis?

300

A technology that inspects and filters internet traffic to prevent threats and enforce compliance.

What is Secure Web Gateway (SWG)?

300

A program designed to educate employees on recognizing and preventing cybersecurity threats.

What is Cybersecurity Awareness & Training?

300

A collaborative security testing approach combining offensive and defensive teams is called this.

What is Purple Teaming?

400

A comprehensive examination that combines forensic techniques with threat intelligence to mitigate active threats.

What is Threat Hunting Assessments?

400

This advanced program designed to monitor and mitigate risks posed by individuals within an organization

What is Insider Threat Management

400

A cloud security solution that acts as an intermediary between users and cloud applications to enforce security policies.

What is Cloud Access Security Broker (CASB)?

400

This certification helps organizations showcase their ability to securely handle customer data and meet international privacy requirements. DOUBLE POINTS - What does SOC stand for

What is SOC2 (Service Organization Control 2)?

400

This testing method targets human factors, such as phishing or social manipulation, to assess an organization's susceptibility to deception.

What is Social Engineering Testing?

500

DOUBLE POINTS - This technology uses a pair of cryptographic keys and digital certificates to verify identities and secure communication.

What is Public Key Infrastructure (PKI)?

500

A cloud-focused strategy to continuously monitor and improve your organization’s security configurations.

What is Cloud Security Posture Management (CSPM)?

500

This framework integrates security and networking functions, including ZTNA, into a unified cloud-based service.

What is Secure Access Service Edge (SASE)?

500

This type of Microsoft tenant might mean this customer adheres to CMMC requirements. 

What is GCC and/or GCC High

500

This offensive technique assesses security architecture by reviewing source code, system configurations, and internal controls.

This offensive technique assesses security architecture by reviewing source code, system configurations, and internal controls.