Countercastle Cybersecurity
 ARTICLES  //  CONSULTING & TRAINING  //  RESEARCH  //  ABOUT  //  CONTACT 
 
CONSULTING & TRAINING
 
Countercastle provides a full range of cutting-edge cybersecurity services across Los Angeles, including security architecture, penetration testing, fraud prevention, employee, training, and more for organizations of every size.
 
 
 
PAST CLIENTS

 
 
 
SERVICES
Discover, Prioritize, and Mitigate Cybersecurity Risks
  • Rapidly Assess Security of Data, Intellectual Property, Systems, Networks, Processes, and Policies
  • Penetration Testing — Discover Whether Your Security Is Really Working
  • Uncover Security Gaps and Opportunities to Simplify Technology
  • Deploy Fraud, Data Theft, Malware, and Phishing Countermeasures
  • Achieve Compliance with GDPR, PSD2, PCI, SOX, HIPAA, FFIEC, NIST, FISMA, FedRAMP, And Other Frameworks
  • Assess Third-Party Security and Contracts
 
Security Management, Training, and Culture
  • Implement Resilient Security Governance (GRC) and Policies
  • Build An Effective Security Awareness Program
  • Get Easy-to-Understand Security Training for Managers and Staff
  • Leverage Staged Phishing and Hacking Attacks to Keep Employees Sharp
 
Cybersecurity Architecture & Engineering
  • Security Architecture for Applications, Mobile, Networks, and the Cloud
  • Credit Card & Financial Transaction Protection
  • Identity Management with Active Directory and LDAP
  • Two-Factor, Single Sign-On, and Secure Session Handling
  • Encryption/Cryptography, PKI, SSL, Digital Signatures, and Key Management
  • Web Application, Bayesian, and XML Firewalls
  • Intrusion Detection & Prevention (HIDS/NIDS/IDS/IPS)
  • Defend Against Distributed Denial of Service (DDoS) Attacks
  • Application, Server, OS, and Network Hardening
  • Disaster & Business Continuity Planning (BCP)
 
Security Coding, Development, Testing
  • Expert Application Testing for Web, Mobile, and Desktop Apps
  • Layered Defenses Against XSS, SQL Injection, Brute Force, and Other Attacks
  • Custom Security Programming & Scripting
  • Code Reviews
 
Gather Threat Intelligence
  • Build An In-House Intelligence and Awareness Program
  • Identify, Monitor, and Investigate Insider Threats
  • Deploy Honeypots & Decoys to Profile Visitors and Attackers
  • Data Loss Prevention (DLP) Systems
  • Improve Visibility into Logs with Security Information and Event (SIEM) Monitoring
 
Security Research
  • Original Studies on Security Code, Systems, Policies, Politics, and Culture
  • Development and Testing of Security Theories & Frameworks
  • Product Proof of Concept Development, Analysis, and Comparisons
  • Efficiency Analysis — Simplify Your Security Approach
 
Industry Specializations
  • Financial
  • Consumer / Retail
  • Entertainment
  • Energy & Industrial
 
Creative Consulting
  • Security, Hacker, and Espionage Consulting for Film & TV