
Cybersecurity Maturity Assessment | CIS Framework
Cybersecurity maturity is evaluated on multiple levels, and to provide guidance and accurate recommendations, GC Security employs a proprietary and comprehensive methodology together with CIS Controls.
Deliverables:
Roadmap with prioritized tasks, guided by a risk-based approach
Comprehensive, proprietary metrics and methodology
Diverse levels of assessment, tailored to your business
Targeting and provision of accurate recommendations, focusing on the areas that strengthen your company's security resilience, while maintaining business continuity
Cybersecurity maturity diagnosis, defining a suggested maturity gain for a 12- and 24-month horizon

Pentest/Penetration Test
We perform intrusion testing (also known as pentesting) on web or mobile applications, systems and infrastructure. We employ whitebox, greybox and blackbox tactics to simulate sophisticated real-world attacks to identify weaknesses that could eventually be used in an attack or data breach.
Deliverables:
Identify and address vulnerabilities
Gain valuable insights from your digital environment
Build trust with customers and partners
Specific recommendations provided by comprehensive reports
Identify high-risk weaknesses that derive from a series of minor vulnerabilities

Imminent Risk Test - IRT
The IRT aims to deliver fast and consistent results through domain enumeration, automated scans using premium tools, and hands-on analysis, to identify imminent risks and provide a Risk Score for both executive and technical reports.
Deliverables:
Delivers fast and consistent results to identify imminent risk
Scan execution using premium tools and proprietary rules
Manual analysis of results obtained
Risk Score for executive and technical reports

Phishing and Cybersecurity Awareness Training
By running campaigns mimicking phishing attacks we are able to determine the risk of your employees being victimized by scams, leading to data breaches or attacks, for example. We track clicks on links and attachments that may be malicious, create detailed reports and holistic awareness programs.
Deliverables:
Decrease of the human risk index
Smart Investment
People awareness & training
Enhancing cybersecurity culture

Vulnerability Management
VM analyzes the company’s entire IT landscape in search of security flaws. It covers infrastructure, devices, servers, and applications and scans for missing updates, configuration errors in devices and networks, user access, and security policies.
Deliverables:
Improved Security and Control
Visibility and data generation
Operational Efficiency
Replicable results together via a long-term solution
Return on Security Investment

Cybersecurity Governance
People, processes, and technology aligned to create resilience. Choose your technological or regulatory framework – NIST, CIS, ISO Standards, PCI, or any other framework your company needs, our Cybersecurity Governance has the tools to guide you on your journey towards maturity and compliance.
Deliverables:
Unique framework combining the most advanced vulnerability detection technologies and intelligent human risk factor forecasting algorithms
Identification and prioritization of risks, specific to your company
Strategic Mitigation Support
Continuous monitoring and correlation of events to identify new risks and real threats

Threat Intelligence (OSINT)
With our monitoring services, we monitor the entire web, including deep and dark web, in search of traces of fraudulent use of your company’s brand, indications of data breaches, and possible attacks, so as to intervene as fast as possible to contain the impact of potential incidents.
Deliverables:
Improve security team performance and efficiency
Thorough cyber threat analysis
Collaborative expertise & knowledge
Improvement of defense and response strategy
Event anticipation

Security Information and Event Monitoring and Correlation (SIEM)
Every device, application, user, and system in your environment generates activity records (or logs). Interpreting and correlating these events can help indicate suspicious behavior and possible cyber attacks. We combine SIEM (Security Information and Event Management) and proprietary intelligence to proactively protect your enterprise.
Deliverables
Identify and address vulnerabilities before a security incident
Obtain valuable information about your company's digital environment
Correlate IT events to prevent security incidents
Reports providing detailed recommendations
Identify high-risk weaknesses as a result of a number of minor vulnerabilities

Established in 2008, GC Security works incessantly to manage digital risks, in companies of all sizes and across all sectors, ensuring full visibility into vulnerabilities and security gaps to protect assets, data, applications, people, and systems.
CONTACT US
Rua Jaceru, 384, conjunto 1909, Vila Gertrudes • 04705-000
São Paulo – SP
contato@gcsec.com.br
+55 (11) 2972-8999
GC Sistemas de Tecnologia e Segurança LTDA © 2021