Security Services Portfolio Contact@Laconicly.com Our Company Laconicly is a leading, independent provider of expert training and professional security services. We bring extensive, internationally recognized expertise and experience to every client engagement. Laconicly has hands-on experience with assessments of the most critical high integrity systems, some of which involved the security of nations. Laconicly is proud to have security consultants with the highest credentials including industry award winners, published authors, and speakers at the most prestigious security conferences including: Black Hat Briefings, RSA, DEFCON, Blue Hat, NATO CCDCOE, and many others. Laconicly is also proud to offer security consultants with active Department of Defense security clearances for those highly sensitive systems that should only be evaluated by those who have been deemed especially trustworthy. Contact@Laconicly.com Laconicly Security Services 510(k) Cyber Security If your organization is looking to produce and sell a medical device within the United States, you must first submit for FDA 510(k) clearance. The FDA 510(k) pre-market submission can be a daunting process, especially for those who are unfamiliar with the new cyber security guidelines. The specialists at Laconicly have experience navigating through the new 510(k) cyber security guidelines and have helped several device manufacturers complete the cyber security portions of the 510(k) clearance. From scoping, threat assessment, testing, and documentation, Laconicly has the experience and expertise to help even the most complicated devices through cyber security portions of the FDA 510(k). Product Cyber Security Review Planning a new product release? The product cyber security review we offer provides you with a thorough security analysis of your product. This review can be conducted before or after your product has hit the market. Our expert and highly skilled specialists will examine and assess all the key components of your product and supporting infrastructure. Attention is also focused on how your application components are deployed and communicate with both the user and server environments. Throughout our testing we apply a rigorous methodology and utilize a mix of deep manual analysis and broad automated testing tools to test for exploitable vulnerabilities. Through this methodology, we are able to provide you with a detailed report and recommend the best methods to secure the product based on your unique business requirements and security best practices. Product reviews can be performed in multiple ways including: Black-box Assessment: In this type of assessment, Laconicly only requires access to the product to be tested. No inside knowledge (source code, knowledge of internal debugging mechanisms, support/technician routines) is needed before the engagement can begin. Laconicly will locate and document vulnerabilities as well as specific recommendations for remediation in the specified product. For those organizations under strict assessment timelines, this is the fastest approach to understanding device security exposures. Code review Assessment: In this type of assessment, Laconicly will leverage the actual source code of the product to perform the assessment. The advantage of this approach is that actual lines-of-code that are responsible for causing the security vulnerability are identified, allowing developers and architects to quickly remediate the issues. The availability of the application source code will allow Laconicly to identify vulnerabilities that may not be able to be located with a Black-box assessment. Security Services 645 W 9th Street Suite 216 Los Angeles, CA 90015 Contact@Laconicly.com Training Offerings Laconicly training curriculum focuses exclusively on cutting edge security best practices , and our dedication means our courses and instructors are informative, enjoyable, and compelling. Our courses use a virtualized training environment in order to give students the opportunity to learn by doing. All classes include detailed labs which will guide students through the concepts that are covered in the class. In addition to the extensive course workbook, students receive the instructional environment, supporting documents, and tools. Students will be able to immediately apply the concepts and skills they have learned. We have tailored our courses specifically for engineers, developers, testers/QA, project managers, and incident responders. Our offerings include in-depth courses on secure development practices, designing resilient systems, analyzing vulnerabilities, and implementing sound QA practices, among others. From individual course offerings to worldwide training programs, Laconicly can meet your organization’s security training needs. All Laconicly training offerings can be customized in order to meet customer requirements. Popular Training Offerings Secure Development Lifecycle The Security Development Lifecycle (SDL) is a software development security assurance process consisting of security practices grouped by seven phases: training, requirements, design, implementation, verification, release, and response. Whether your organization is new to the SDL process or a review is required in order to improve existing processes, Laconicly’s extensive background in the SDL process assures that we can provide expert guidance on implementing a SDL in your organization. For those organizations looking to build a robust SDL, this course is an excellent foundation. Building a Robust Security Capability As organizations grow and mature, the desire for an organic, in-house security capability becomes a requirement. Building a robust, sophisticated security team, along with the process and procedures for running an efficient security team can be an arduous task. The professionals at Laconicly Security have extensive experience in building security teams and developing sophisticated security capabilities. We’ve helped build sophisticated teams for the DoD and Fortune 500. The professionals at Laconicly will help your organization understand your current capabilities, help define needed capabilities, develop the methodologies needed for robust security capabilities, and can even assist in the team member selection process. We’ll lay the foundation for a successful security team and augment the team as needed. Contact@Laconicly.com About Laconicly Security Services Our Culture Passion for security, unwavering integrity, and a commitment to excellence are the founding principles of our culture. Every member of our hand-picked team is committed and passionate about their work. We believe this is the only way to consistently provide excellent customer service and cutting edge security research. Our unwavering integrity and our commitment to excellence shows in every client interaction and every deliverable we produce. At Laconicly Security, we also understand that we have a moral obligation to help improve the general state of security in the industry. Our efforts have been publicly recognized by industry leaders, the Department of Homeland Security, and the Industrial Control Systems – Cyber Emergency Response Team (ICS-CERT) on numerous occasions. Security Services 645 W 9th Street Suite 216 Los Angeles, CA 90015 Contact@Laconicly.com www.laconicly.com
© Copyright 2024