Service Overview
This workshop is conducted following the completion of CYE’s Security Risk Assessment. It is designed to review and address the identified vulnerabilities, which are documented in Hyver, CYE’s Continuous Threat Exposure Management (CTEM) platform. These vulnerabilities are mapped to relevant threat sources and linked to the organization’s critical business assets, allowing a structured evaluation of their potential impact. Leveraging graph theory and algorithms, CYE recommends mitigation strategies that are prioritized based on both risk reduction impact and cost-efficiency.
Methodology
After reviewing the attack graph and identified vulnerabilities, CYE formulates short-term and long-term mitigation plans. These plans are developed using graph-based algorithms that prioritize based on both business impact and cost efficiency.
The mitigation strategy is then reviewed with the client and relevant technical teams. The collaborative workshop focuses on root cause analysis and aligning recommendations with existing tools and operational realities such as budget constrains. During the session, the proposed plan is refined to suit the client’s specific needs, challenges, and unique characteristics of their environment.
Deliverables
A Hyver-based action plan broken down by workstreams, mapped to relevant security domains or technical teams
Prerequisites
Completion of CYE's Security Risk Assessment prior to the workshop
Customer Engagement
The engagement includes two stages:
Preparation: Cooperation of personnel with relevant domain expertise
Workshop: A half-day session with the client’s technical teams (based on the organization’s structure)
Relevant Standards
NIST Cybersecurity Framework
Common Vulnerability Scoring System (CVSS)
Security Domains Covered
Cross-organization policies, procedures, and governance
Security operations, monitoring, and incident response
Network level security
Servers, network equipment, and endpoints security
Application-level security
Sensitive data and information management
Identity management and remote access
