Deceptive Defense, Inc. is an industry leading cyber security company focused on helping organizations reduce business risk by leveraging cyber-deception solutions as part of their respective IT security programs.
The company is a privately held organization based in the United States. We provide a complimentary portfolio of cyber security services and solutions to public and privately-owned companies across many regulated industries as well as Federal, State, and Municipal governments across the globe.
The companies tagline "Take Back The Advantage" highlights in part one of our goals which is to debunk the perception that "Defenders need to be right 100% of the time while the bad guys only need to be right once." That is simply not the case when cyber deception is employed appropriately!
We engage one of less than 200 people who have achieved the security industry’s premier practical certification, the GIAC Security Expert, one of less than 20 people certified by SANS as a Cyber Guardian for both red and blue teams and one of less than 150 SANS Certified Instructors.
Our consultants achieve and maintain some of the security industry’s most recognized certifications including:
· GIAC Security Expert
· Certified Information Systems Auditor
· GIAC Certified Windows Security
· GIAC Certified Enterprise Defender
· GIAC Mobile Device Security Analyst
· GIAC Auditing Wireless Networks
· GIAC Certified Incident Handler
· GIAC Reverse Engineering Malware
· GIAC Certified Penetration Tester
· GIAC Certified Intrusion Analyst
· GIAC Certified Forensic Analyst
· GIAC Perimeter Protection Analyst
· GIAC Certified Security Consultant
· Snort Certified Professional
· GIAC Security Essentials Certification
Our consultants also work to pass on security knowledge to the community via involvement with SANS by teaching:
SEC550 – Cyber Deception - Attack Detection, Disruption and Active Defense
SEC580 – Metasploit Kung Fu for Enterprise Pen Testing
SEC561 – Intense Hands-on Pen Testing Skill Development
SEC560 – Network Penetration Testing and Ethical Hacking
SEC504 – Hacker Techniques, Exploits and Incident Handling
SEC503 – Intrusion Detection In-Depth
Things you can count on from us
Our experiences have taught us that different organizations have different cultures, risk tolerance levels, and varied abilities to effectively and securely drive business with the assistance of technology.
Our expertise enables us to quickly identify where an organizations cyber security maturity level is and then determine how to continuously and effectively manage related business risk in a proactive, cost-effective, and business focused manner.
We know it’s a team effort! Our professionals have experience engaging audiences ranging from the Board Room to the technologists who are tasked with the daily operations of technology. This results in our deliverable's being relevant and actionable!