top of page
4047354-hd_1920_1080_25fps-ezgif.com-video-to-gif-converter (1).gif

Use Case

1600 Cyber has extensive experience and proven track record. Our solutions are aligned to Industry Best Practices, Framework, and Standards, coupled with our expertise, experience, and qualifications results in a combination that makes us the ideal lead partner for your project. Our consultants have supported some of the largest global corporations. We not only succeeded in helping increase the protections and effectiveness of their security programs, we also designed and implemented
technical cyber capabilities to combat digital attacks. To better explain our qualifications and expertise, allow us to review use cases, with global clients Fresenius, o2Telefonica, and SAP SNT.

First we discuss Fresenius. Towards the end of 2020, Fresenius suffered a massive Ransomware attack that caused the organization millions of dollars in damage. 1600 Cyber was identified and trusted at the beginning of 2021 to implement effective incident response processes and capabilities to address potential future attacks. When we were brought on board, using the Identify Function of NIST CSF, we identified critical business assets, processes, functions, and data, as well as gaps in existing technical skills, security controls and protections. We discovered Fresenius is a Global health care provider, with over 40,000 employees, in 100+ countries, including the United States.


Our security efforts and targets had to first take into account the different laws and regulations of the localities. Next their infrastructure is a combination of operations technology (including manufacturing), and enterprise IT, and these environments have segments on premise and in the cloud. Also there were several modernization initiatives that were underway with parts of the infrastructure. The next consideration was that they were facing budget constraints. Standing up a big team of cyber professionals, and implementing expensive cyber tools to quickly and dramatically improve their cyber security posture was not an option.


The solutions implemented had to be effective, but lean in terms of financial burden on the organization. Finally beyond the technical,organizational, and management acumen required, the approach and training element was quite challenging. We had to deliver technical cyber and information security training to people all over the world, from different backgrounds, and technical skill levels in a way that was engaging and bridged cultural differences. We were able to navigate the training challenges because training is one of our core competencies. A key competitive advantage for us is that we are an accredited training organization. We know how to train, and we have been trained on how to teach students effectively based on proven methodologies. Just because an organization boasts technical capacity and skill, does not always mean they can effectively train others. Now consider the following goals we achieved, which included:

An approach that upskilled existing Fresenius technical and non-technical employees representing each region in Fresenius´s organization using ISACA, and NIST based training curricula. No new costly cyber hires were necessary, rather over 150 Fresenius employees were trained on Cyber Security Fundamentals, Incident Response, and Communication Coordination during a cyber attack, and additional relevant technical cyber skills. These upskilled employees formed the Cyber Security Incident Response Team (CSIRT).

Today the CSIRT is a vital part of Fresenius Security as a direct result of the training these employees received. Establishment of a Service Now CSIRT Technical Service Desk to manage the lifecycle of cyber incidents reported from the greater Fresenius community as part of the Incident Response process. Development of a Cyber Security Tool Kit featuring tools such as CrowdStrike, Windows Defender, Any.Run, Virus Total, Splunk, etc. Deployment of this Security Tool Kit to CSIRT personnel situated around the world enabled them to execute the security processes and playbooks 1600 Cyber developed. Playbooks were developed to manage incidents involving other categories of cyber attacks, ie data breaches, supply chain attacks to minimize supply chain risks.
 

With o2, 1600 Cyber led Incident Response to Real World Cyber Attacks for several years. During this time we built the incident response process from scratch and also delivered dramatic improvements to the Vulnerability Management, Change Management, Security Monitoring and Detection, SecOps, and Risk Management processes. With our work here, the existing team was full of highly skilled technical engineers, amazingly effective leadership, and advanced cyber tool stacks. We were able to integrate with their existing team and contribute to increase the team's effectiveness, and organization´s overall cyber resilience.  We made an already strong organization, stronger and more efficient

telefonica.png
sap.png

SAP and the SAP Next Talent Program. SAP continuously onboards new employees. These employees work in all areas from cloud architecture, full stack development and devops to ui/ux design and data science, and they have access to critical SAP resources and environments. 1600 Cyber provided comprehensive training, instilling a cyber aware, cyber vigilant mindset from the earliest stages of a new hire being onboarded. SAP recognized that people create the biggest risk and increase attack surfaces.  SAP made Cyber Awareness and Security Training mandatory for new hires. Through our training we facilitated SAP´s ability to increase and foster a cyber aware culture.

bottom of page