Our

Approach

There are no passengers on spaceship earth.  We are all crew.  – Marshall McLuhan, 1963[2]

Intelligent Cyber Resilience

A RISK-BASED APPROACH FOR PRACTICAL, EFFECTIVE CYBERSECURITY

Why should my organization be concerned about cybercrime?

According to Verizon’s1 2024 Data Breach Investigations Report, 70% of cyber attacks involve a secondary victim and rely on decades-old techniques of phishing and hacking. Hackers are well funded and extremely sophisticated in their attempts to commit cybercrime. The narrative has changed from how do I keep criminals out to how do I bounce back quickly with minimal damage.

What is Intelligent Cyber Resilience (ICR)?

Watsec developed the ICR risk assessment approach as a practical way for our business clients to quickly understand and resolve cyber exposures, achieve compliance requirements, and maximize return on their cybersecurity investment. In short, it enables organizations to identify, prioritize, and manage cyber exposures to the level appropriate to their organization.

Why is it so effective?

ICR addresses both critical aspects of cyber exposure: the technological and the human.

    • Technology – What are the major exposures to key business assets, and are they being addressed appropriately?
    • Human – Are the right business processes in place to ensure employees are successful at protecting business assets?
1Verizon’s 2015 Data Breach Investigations Report, https://www.verizon.com/business/resources/reports/dbir/
2Marshall McLuhan, “Marshall McLuhan Quotes“, Goodreads, Marshall McLuhan Quotes.

How will ICR help my organization?

ICR is a practical approach to managing cyber exposure. It was developed to enable progressive organizations understand which of their assets are most at risk and how best to address that exposure. Understanding which cyber risk scenarios your organization is most vulnerable to and the potential impact to the company, is the best approach for deciding where and how to invest limited business resources.

 

    1. Pre-assessment interviews with business system asset owners;
    2. Technology assessment for both internal and external network exposures;
    3. Review of key security policies and processes;
    4. Detailed report of exposures, prioritized to ensure the most critical issues are addressed first;
    5. Post-assessment debriefing to ensure a full understanding of assessment findings.

To arrange a frank discussion about how you can arrest a looming threat:

CANADA

5-420 Erb Street West, Suite 228, Waterloo, ON N2L 0J6

UNITED STATES

364 Patteson Dr. Suite 258 Morgantown, WV 26505