Service Overview
This service provides a cybersecurity due diligence threat intelligence investigation targeting clear web, deep web, dark web, and cellular application ecosystems. The goal is to identify any evidence or indications of data breaches, data leakage, or malicious activity affecting the company in interest.
Methodology
CYE experts focus on the organization and its subsidiaries to uncover leaked data, analyze threat exposure, and assess attacker interest or intent. This investigation supports customers in accurately evaluating M&A risk and includes:
Identification of potential incidents
Investigation of potential attackers with intentions and/or opportunities to target the company
Discovery of specific customer information being leaked or sold on various platforms
Deliverables
An activity summary report detailing all gathered information during the investigation (all evidence or indications of data breaches, data leakage or malicious activity that is taking place in the company in interest)
Bottom-line analysis and insights related to M&A cyber risk
Prerequisites
To initiate the investigation, the following information is required:
Domains
IP addresses of targets
Names of relevant personnel, technologies, or suppliers (depending on the activity type)
Customer Engagement
The activity is managed by CYE’s intelligence team. Minimal involvement is required from the customer aside from initial scoping.
Relevant Standards
Proprietary methodology based partially on:
NIST Cybersecurity Framework
Security Domains Covered
Security operations, monitoring, and incident response
