Services Offered under Consulting
a. Thales Risk Assessment Process
A risk assessment is a crucial part of understanding the threats to your information and information
systems. Our cybersecurity consultants can help you identify and prioritize risks to your assets and help
inform decision makers to determine appropriate courses of action in response to identified risks. Our
cybersecurity consultants have a wealth of knowledge in governance, risk management and compliance or/and have worked in the following industries: rail, aviation, defense, and air traffic management. They have been engaged in large scale initiatives and small projects and while we can’t tell you when an attack is coming – we can make sure you’re ready for it.
Brochure | Case Studies | Data Sheet | Whitepaper
b. Cybersecurity Vulnerability for IT and OT Networks
Is your organization prepared for a cyberattack? Your IT systems might be, but have you considered other
points of entry? Your production system, power grid, pipeline and any other equipment you build or operate that is computer controlled at any level is a potential target. Every networked element has become an entry point for a cyber criminal. With a unique focus of securing not just your IT networks, but your Operations Technology (OT), a Cybersecurity Vulnerability Assessment will provide you with insights into your organization’s weaknesses. Coupling our operational domain and our security expertise ensures that we are ready to do an assessment fast, and that the resulting CVA is relevant, realistic, and complete, with recommendations your operations staff will readily understand and can implement.
Brochure | Case Studies | Data Sheet | Whitepaper
c. Cyber Human Error Assessment Tool
Around 62% of breaches are caused by Human Error , - Human Error covers both malicious insider attacks,
and the common errors in judgement and lack of understanding of staff at all levels. Thales’ Cyber Human Error Assessment Tool (CHEAT) is a proven process for determining how human-made vulnerabilities, psychological motivations, and cultural issues weaken an organization’s cybersecurity. A Chartered Institute of Ergonomics and Human Factors (CIEHF) accredited consultancy with over 25 years’ experience is on hand to tackle human-related threats to cybersecurity to make your system safer.
Brochure | Case Studies | Data Sheet | Whitepaper
d. Cyber Enterprise HealthCheck
Thales Cybersecurity Solutions & Consulting are experts in the analysis of cybersecurity risk for mission critical systems and organizations. A Cybersecurity Enterprise HealthCheck is a modular assessment tool
that measures a business’ cyber-maturity. It identifies your critical information assets and provides information that will help your organization make strategic and tactical decisions on your cybersecurity
program.
Brochure | Case Studies | Data Sheet | Whitepaper
e. Thales Intelligence Service
Trusted with safety and security by critical organizations around the world, Thales Intelligence Service (TIS)
provides the people, processes and technology to help you reduce the threats, resolve uncertainty and
make timely, insightful decisions to improve and protect your organization. Our global community of
intelligence experts knows how to get the information you need to plan your future and will work with you to help craft a solution that will help you take full advantage of emerging opportunities.
Brochure | Case Studies | Data Sheet | Whitepaper
f.Cybersecurity Architecture Assessment Service
Using our expert knowledge and industry best practices, Thales Canada Cybersecurity Solutions Consultants can help you discover and remediate weaknesses in your IT and OT network architecture.
Through a comprehensive assessment we identify where your networks are vulnerable and help you
remediate the infrastructure and redesign it to facilitate safe growth, and simplify cyber protection
requirements and reduce costs.
g. Forensics
Rapidly prevent, detect and respond to threats; Thales Canada Cyber Consulting facilitates rapid
investigation as the attack develops in near-real time. Our experts offer both enterprise and endpoint
forensics, as well as malware analysis and threat analytics. With Thales, you’ll have the resources on hand
to recognize, respond and recover from an attack; enabling your business to operate, reliably without
interruption. And once the threat has been repelled, we are there to help you do whatever is needed to
ensure your systems are better protected in the future.
h. Threat Hunt
Threat hunting is the proactive pursuit of abnormal activity and signs of intrusion within the IT environment, i.e. servers, networks and endpoints. Our cybersecurity team systematically explores, examines and analyzes processes, logs, network traffic, and memory to identify places where your system could be compromised. We work with you to identify your critical assets to identify attacks, in some cases before they proliferate, and prevent and minimize damage taking into context threat intelligence (current and emerging threats) and the operating environment of your organization.
i. Secure by Design
Rather than leaving security as an afterthought that needs to be added in, Secure by Design works with you via a process driven approach tailored to the specifications you need to implement secure functionality into your new product, IT or OT network or infrastructure, or service. We work with you from product conception for as long as you need us to develop a safe, resilient solution that will protect you in your unique landscape and meet your requirements.
Services Offered under Solutions
As systems become more complex, the surface area open to attacks becomes broader. Our consultants
can help you move encryption beyond your hardware. From file level encryption to local key management
Thales can help you control access within your network. From Containers to the Cloud and beyond our
consultants will recommend the best solution for your needs.
k. Security Interface Gateway
Firewalls aren’t enough to protect your critical systems since they cannot truly interpret API-specific data
and may fail to filter sophisticated malicious content. The Thales’ Secure Interface Gateway (SIG) allows you to increase the digital connectivity of your network by bridging the gap between your signaling and IT systems. It filters, validates and translates all the information coming into your network. The SIG ensures only authorized and validated information is allowed into your network, protecting it from external attacks.
l. ICS/OT Cybersecurity Solution Design and Implementation
We look beyond your perimeter defenses to design a solution tailored to protect your critical infrastructure. By determining the needs of your system we work with you to segment your security zones and conduits to craft a solution designed to keep your business moving, safely and at a lower cost than what you would spend protecting and unoptimized network. We work together to reduce the risks of an attack from outside your perimeter zones.