Do you want to switch the language?

IT Security

The Cyber Security - Unified Kill Chain at a glance

Unified Kill Chain

Anyone who wants to hack a company tries to find a so-called kill chain and use it to establish their criminal activities. What does that mean? A few steps are required before the "Kill chain complete!" can be said. First of all, it must be possible to identify the infrastructure system and penetrate the system ("IN"), for example via social engineering such as phishing emails. Then the attackers must expand their access rights within the company network ("THROUGH") in order to - last but not least - cause damage ("OUT") that generates money, such as blackmailing the company through ransomware (data encryption or data sale).

Cyber Security Report 2024.
We are sharpening our focus on cyber security.

In our IT strategy, we address the various facets of a cyber attack and build a universal "cyber block chain" to detect, respond to and prevent the various techniques and tactics of an attack. (PREVENT, PROTECT, DETECT, RESPOND) You can find an evaluation of current attack methods in our Cyber Security Report 2024.

Request now

we transform for the better

Security strategy

Speak one language. Pulling together. Finding solutions together. Our cyber security strategy.

We are one of the leading cyber security companies in the DACH region. Around 300 multi-certified IT security specialists in various powerful teams work around the clock on security projects or analyze security-relevant incidents, the trend and complexity of which are increasing. Constantly changing requirements, new threat situations and artificial intelligence influence the way cyber security is viewed. Our strategy is to combine companies' existing infrastructures with modern solutions in order to be protected against the current threat landscape.

Besonderheiten-1061x560
1.

A common language

We speak "one language" across all technically and strategically necessary specializations and see and deal with cyber security from the perspective of both the defenders and the attackers.

2.

Clear strategy

We have a clearly defined strategy for protection and defense and assess threats according to the security maturity level of our customers.

3.

Cyber Defense Center

Thirdly, we have a powerful Cyber Defense Center. A proactive service that goes beyond a traditional security operations center, actively hunting threats and tracking attacks right through to the operational technology (OT) world.

4.

Purple Team

We have our own RED team ("attack simulation") and BLUE team ("defense") and pursue a symbiotic PURPLE strategy.

5.

Operational security and supply chain security

We are specialists in all security-relevant areas of a company, from classic IT to IOT, operational technology and supply chain security.

6.

Technology partner

We work with the world's leading technology providers and expand their product portfolio with our services.

7.

Foresight

We anticipate potential new strategies and updated approaches by cyber criminals.

Uncovering weaknesses and process and structural problems

The classics among the security solutions, from the firewall to encryption

Specific services that become important after an attack

Detection of system infections

  • BLUE-Team (CDC) Deepdive
  • Countering attackers
  • Incident Response (-Readiness)
  • Forensic Analysis
  • Detection of existing system infections
  • Security Monitoring
  • Compromise Assessment
  • Vulnerability Assessment
PREVENTPROTECTRESPONDDETECT

Red Team Deepdive

Read more

Blue Team Deepdive

Read more

Purple Team

Read more

Information Security Management

Read more

OT Security

Read more

System Integration

Read more

Events - 22 - 24. Oct 2024

it-sa 2024

We are at it-sa 2024 in Nuremberg! Book your personal appointment with our security experts on our website below and secure your free ticket. The best defense against cybercrime is a holistic …

Details & Register

Case Study

Wienerberger

KBC Cyber Defense Center, the Security Operation Center for optimal IT and network security.

Read more

Case Study

Spittal Hospital

Comprehensive cyber security solution for secure network communication and protected databases.

Read more

Case Study

Harreither GmbH

A new IT infrastructure for Harreither: the strong basis for a digital future.

Read more

Contact
CANCOM Austria

Request now

How may I help you?