<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
search
close

Hâck The Hague: From council questions to a unique hacking competition

The Hague Municipality’s Council, Monday 30th of September 2019 at 10:25 AM. On this location 3 years ago, the idea for the first edition of this event was established. Today, as chairman I have the pleasure to initiate its third edition, Hâck The Hague 2019. For the third year in a row, the municipality of The Hague and Cybersprint are working together to test the digital security of the city along with its inhabitants.

read more

HÂCK THE HAGUE DISCLOSED

Join our special-edition webinar on 28 September, 4pm CET. 

read more

HÂCK THE HAGUE 2021

Always wanted to try and ethically hack the city of The Hague? This is your chance! Pre-register for Hâck The Hague 2021.

read more

Hâck The Hague Disclosed: A behind-the-scenes webinar

Join our special-edition webinar on 28 September, 4pm CET.  During this webinar, we’ll talk you through the most impressive hacks and highlights from past editions of Hâck The Hague along with the experiences of previous contestants.

read more

Use case: ifm electronics

ifm's biggest challenge was to inventory their online assets, and to determine whose responsibility they were. Digital footprint mapping helps ifm improve their cyber-resilience and security workflow. 

read more

Use case: Provincie Overijssel

For governmental organisations, it is important to have a clear overview of their digital footprint and risks. They need to ensure the right policies are in place when it comes to cybersecurity. To illustrate their challenges, and the benefits of digital footprint management, we’ve interviewed one of our customers from the governmental sector. Rick Verkade, Security and Privacy Specialist at Provincie Overijssel shares his experiences in this interview.

read more

Use case: Provincie Overijssel

For governmental organisations, it is important to have a clear overview of their digital footprint and risks. They need to ensure the right policies are in place when it comes to cybersecurity. To illustrate their challenges, and the benefits of digital footprint management, we've interviewed one of our customers from the governmental sector. Rick Verkade, Security and Privacy Specialist at Provincie Overijssel shares his experiences in this interview.

read more

Cybersprint nominated for Computable Awards 2020

Cybersprint is excited to announce that we are nominated for the Computable Awards 2020 in the category of “Security and Digital Forensics”.

read more

How to prevent CEO-fraud with your digital footprint

CEO-fraud is the most common form of cyber-crime to target businesses worldwide. It’s now a 26-billion-dollar scam and continues to grow rapidly, with a 100% increase between 2018 and 2019. Creating awareness among employees is critical, but doesn’t offer full protection. What technical measures should you take to prevent a CEO-fraud attack at your organisation?

read more

MAPPING DIGITAL FOOTPRINT & DRP TO MITRE PRE-ATT&CK®

This paper maps the MITRE PRE-ATT&CK matrix to Digital Risk Protection and digital footprint solutions. It provides insights into the tactics, techniques and tools cyber-criminals might use, and how you can leverage these strategies to detect and prevent incoming attacks.

read more

Webinar: PREDICTING ATTACKS WITH DIGITAL FOOTPRINT AND PRE-ATT&CK

Cyber criminals use the wealth of information on your organisation to plan their attack. The MITRE PRE-ATT&CK provides the tactics to understand and detect those activities, helping you to prevent attacks before they happen.

read more

Mitre PRE-ATT&CK: What is it and how to use it

One of the best ways to improve your digital security is to let the past help prepare you for the future. Knowing the tactics threat actors have used in other cyber-attacks will help you determine what you should protect your systems from. Luckily, you needn’t figure that out by yourself. Mitre has created frameworks of the many different ways cyber-attacks have been orchestrated in existing use cases. Here’s how you can use this information to strengthen your cyber-resilience. What is the Mitre PRE-ATTACK framework? Mitre is an American organisation conducting federal-funded research into various markets with the aim to create a safer world through their research. Cybersecurity is one of those markets. To help organisations understand where their might need to focus more security resources on, they created two matrices of all techniques cyber-criminals have used to set up and execute attacks in the past. These are called the ATT&CK and the PRE-ATT&CK frameworks. Even though the ATT&CK framework is most well-known, we see a shift occurring, as PRE-ATT&CK is starting to step out of the shadow of ATT&CK with a more specific focus. Whereas the ATT&CK framework concentrates on the steps taken once an attack is launched, the PRE-ATT&CK framework focusses on the preceding preparation phases, allowing organisations to predict and prepare for attacks before they happen. Mitre’s frameworks match with other models, helping to frame the extensive matrices. To illustrate how PRE-ATT&CK differs from ATT&CK, we’ve plotted the frameworks in the ‘7 stages of the cyber kill chain’, as created by Lockheed Martin. All steps needed to execute a cyber-attack can be divided over these seven stages. As shown below, the first two stages are broadly covered by Mitre’s PRE-ATT&CK, and the other five by the ATT&CK framework. How to apply PRE-ATT&CK Preventing an attack is far more cost-effective than having to repair damages to IT systems, let alone the financial or reputational impact it can have. It is hard and expensive to determine the impact of an attack with IT forensics and replacing infected systems can have a negative effect on overall business productivity. Incorporating an automated outside-in perspective of your brand’s online exposure allows you to discover vulnerabilities in the same way an attacker might look for entry points into your IT infrastructure. This approach empowers you to regain control over your digital attack surface and mitigate risks before they can be exploited. This approach is called digital footprint management and can be placed under the concept of Digital Risk Protection. Below is an overview of Mitre’s PRE-ATT&CK framework. The complete matrix is a little too large to be read in detail, so a deep dive into the content is available via this video. The highlighted fields represent the areas covered by Digital Risk Protection and digital footprint monitoring. The light green indicates partial coverage and deep green full coverage. Combining the PRE-ATT&CK framework with your existing security procedures can help you identify potential threats and weak spots in your systems. Still, you first need to have a complete overview of your organisation’s digital assets before you can confidently say where you are more likely to be hit. That’s why the digital footprint approach works so well with PRE-ATT&CK. Having both will help you determine and validate where you might have underspent or overspent on security measures, for example. Besides improving the cyber-resilience of your systems, incorporating the Mitre PRE-ATT&CK framework in the organisation’s digital footprint will bring more business value to the organisation as a whole. This whitepaper explains the PRE-ATT&CK framework in more detail, and describes the specific ROI for your organisation. Looking for a comprehensive clarification of the security tactics described above, explained with actual use cases? Watch our recorded webinar. Sebastiaan Bosman is Content Marketeer at Cybersprint. With a   background in Communications and Linguistics, he is responsible for   the creation and editing processes of most internal and external   communication. He writes content such as blogs, whitepapers and   case studies, primarily based on Cybersprint’s own research data.   Previously, Sebastiaan worked as Content & Communications   Advisor at ING Global.

read more

Webinar: Could this happen to us?

Data breaches, phishing scams and malware are still making headlines. The impact of losing information of millions of customers can result in significant financial consequences, along with disrupted business productivity and reputational damage. Inevitably, the dreaded question is: "Could this happen to us?"

read more

From practice to preventing: How criminals adapt their attack methods

Similar to traditional ‘brick-and-mortar criminals’, not all cyber-criminals employ the same method to reach their goal. A burglar wouldn’t enter a house with an alarm or when there are people inside, but go for an easier opportunity. The same goes for internet-thieves. Their risk/reward balance depends on the required investment beforehand to successfully carry out their attack. What are the aspects they take into consideration?

read more

Webinar Mitigating 3rd Party Risk

A solid mitigation strategy is vital when protecting your organisation from third-party risk. How can you regain control over your third-party risks, and what are the key components of an effective mitigation strategy?

read more

Webinar: Preventing attacks with digital footprint and PRE-ATT&CK

Growing digital services and supply chains have lead to thousands of entry points in your organisation. Relationships with suppliers and third parties are necessary for your business, but parts of them are not under your direct control. Join our webinar on 01 July, and see how you can prevent and detect attacks before they happen.

read more

Cybersprint recognised in CyberTech100

We are excited and proud to announce that Cybersprint is mentioned in the Global CyberTech100 list, as provided by FinTech Global. The list recognises 100 cybertech companies from all over the world, who provide the most innovative cyber defence services for financial institutions.

read more

Do you have a question?

Our experts have the answers

Contact us