Background Image

Security Consulting

Behind every great leader is a network of trusted advisors

For many leading organizations, Recon is that trusted advisor

CYBER SECURITY ACCELERATION

No matter where your organization is on its Information Security journey, Recon Cyber Security Accelerations are designed to answer your two most pressing questions, “How good is our security?” and “What is the best way for us to improve it?” CSAs are a proven methodology that assesses your current information security posture; identifies immediate low-cost, high-impact priorities; proposes key initiatives; and recommends a best practice framework to guide future work.

Custom Projects

Many organizations desire a mature cyber security program but lack the resources to develop one from the ground up. We’ve built these programs for organizations ranging from state & federal governments, financial institutions, utility providers, healthcare organizations, and various critical industry partners. For organizations with adequate in-house personnel resources, Recon can bring information security expertise to projects involving policies, IT and IS strategy, infrastructure design, SOC procedures, security operations automation, incident response, threat hunting, disk and memory forensics, network forensics, threat signature authoring, and threat intel ingestion.

Tailored Threat Intelligence

Recon has dedicated Threat Intel analysts who constantly monitor various threat intel channels for threats relevant to Recon customers. As a result, we provide our customers custom and concise briefings on threats relevant to their industry or organization. This information is also used to inform our Security Operations team on methods to bolster defenses as needed.

Custom Tailored Offerings

For organizations with adequate in-house personnel resources, Recon can provide custom solutions as well as hands-on training to bring highly advanced Cyber Security capabilities to an existing IT or security team. These solutions include but are not limited to incident response simulation, threat hunting, disk and memory forensics, network forensics, threat signature authoring, threat intel ingestion, security operations automation, etc.