At K2 Group, our mission is to provide comprehensive solutions to ensure, defend, and deliver our clients’ interests. We provide a diverse staff of professionals with a reputation for collective excellence - focused on achieving superior results against our client's most complex, high-risk challenges.
Supply Chain Risk Management (SCRM)
In the current global economy, supply chains consist of various vendors from disparate locations around the globe that produce key components. These critical components may originate in regions of sustained volatility, or with uncertain quality standards. Supply chain design and modeling has become a critical business function.
Threat and Vulnerability Assessments
Our methodology encompasses the three components of risk: threat, vulnerability, and consequences. Our method enables our security experts to describe the vulnerabilities to different attacks as well as their relative priority in a selected system within a critical infrastructure. We start by identifying critical nodes of a system, sub-system, components, and vital assets. We define the characteristics and capabilities of internal and external threats to the critical infrastructure. Finally, we evaluate kinetic and non-kinetic attacks on components of a critical infrastructure system that may be targeted for specific, even pinpoint effects.
Adversarial Analysis / Red Teaming
Analysts are responsible for the conduct and evaluation of specific threat assessments – to include gathering information based on program objectives, identifying gaps in information gathering, and prioritizing courses of action pertaining to the assessment from an adversarial perspective
Incident & Consequence Management
Potential attacks on elements of an infrastructure require protective considerations. Infrastructure protection involves proactive risk management actions taken to prevent destruction of, or incapacitating damage to, networks and systems that enable modern society. We plan for the possible attack from a variety of methods including devices containing chemical, biological, radiological, nuclear, explosive or incendiary material.
Continuous Diagnostics and Mitigations (CDM)
Security technologies are built and managed to identify what’s on the network, who’s on the network, and to see what’s happening on the network in near real time. Applying analytics and context to a widespread level of visibility across the enterprise improves data security and ensures cyber protection.
K2 Group
Technical Thinking. Operational Mindset. |
|
Functional Areas of Expertise |
Supply Chain Risk Management (SCRM) |
Threat and Vulnerability Assessments |
Adversarial Analysis / Red Teaming |
Incident & Consequence Management |
Continuous Diagnostics and Mitigation (CDM) |
|
|