Story image

The 'wargames' are on: Unisys launches threat simulation services

31 Jan 17

Unisys has launched a new set of cyber resilience services that use real-world threat simulation to help clients plan for cyberattack crises. The new services use threat simulation to develop avoidance and response policies and procedures.

“The stakes are extremely high for executives responsible for averting any crisis that can result in brand damage, market devaluation or loss of customers,” says Tom Patterson, chief trust officer at Unisys.

The company developed the new services based on US Department of Defense cyber wargaming methodology and US-based standards for security, but designed them specifically for enterprises and governments.

These techniques allow Unisys technology to identify the most likely, most dangerous and out-of-the-box challenges for clients. It also assesses the level of preparation clients put into managing crisis events, as well as how complete its incidence response plan is.

The technology also allows clients to organise teams, which can achieve event objectives while responding to operational and environmental condition changes.

The end result is a detailed blueprint of exercise analysis and recommendations, the company says.

At the head of the resilience services is Unisys global director John Bone, who says the wargaming tactic is differentiated by people, programmes and partners, therefore it offers immediate results.

“Working at the client’s comfort level, we collaborate to understand their challenges; build wargame scenarios that align with their real-world threats; and lead, monitor and analyse exercises based on those scenarios. Then we provide honest, actionable feedback to help them improve,” Bone concludes.

Ransomware infection? Here’s how you control the damage
Ransomware has evolved to be more sophisticated and targeted, and remains a threat to businesses of all sizes.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.