Cyber Emergency? For Urgent Support Call 844.40.PHISH (74474)
PeopleSec™
  • Solutions
    • PhishFirewall™
  • Services
    • Social Engineering Services
    • Web Application | Penetration Testing
    • Governance, Risk, Compliance & Audit
    • Mergers & Acquisitions Security Evaluation
    • Application Security Assessment
    • Red Team Penetration Test
    • Staffing & Recruiting
    • GAP Assessment
  • About
    • Leadership
    • Careers
    • PeopleSec In the News
    • Disclosure Policy
  • Contact
  • Speaking/Training
    • Executive Cyber Leadership Training
  • Members Login
  • Search
  • Menu Menu
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

M&A Cyber Assessment

PeopleSec understands that cybersecurity is a critical factor while evaluating an organization for a merger or acquisition. This is why PeopleSec has developed an assessment explicitly tailored for mergers and acquisitions. This assessment will give insight into regulatory and compliance adherence, policy and procedure and determine the likelihood of a breach happening.

Assessment includes:

SANS Top 20 GAP Assessment

During this assessment, we cover everything; Device Inventory, Software Inventory, Secure Config of both Hardware & Software, Secure Network Config, Boundary Defense, M.M.A. (Maintenance, Monitoring, and Analysis of audit logs), Application Security, and Admin Privileges.

Regulatory Compliance Assessment

One of the biggest challenges facing companies trying to maintain compliance is gaining confidence in their IT systems currently in place. The importance of knowing IT systems are able to fulfill tasks involved in compliance and risk management cannot be overstated.

Penetration Test

Advanced Persistent Threats are not mitigated by simply installing standard security software and hardware such as firewalls and antivirus. Cyber security professionals identify your threats then implement safeguards to protect against them.

Data Protection Assessment

Is sensitive data being properly protected. How easy could this company become a victim of a major breach? Would they even know?

Password Audit

A password audit begins with an engineer attempting to break the encryption on each password stored on your domain controller in order to identify weak passwords. These decrypted passwords will then be reviewed to identify weaknesses in your policy or policy enforcement.

OWASP Top Ten

Websites or web applications are common targets for attackers. Using small and simple vulnerabilities, an attacker can gain access to confidential information that can lead to financial loss or tarnished reputation.

Copyright © 2022 PeopleSec, LLC. All rights reserved.
  • Request Help
  • Privacy
  • Terms of Use
  • Blog
  • About
Scroll to top