Incident Report Helpline

(203) 307-4984

Call Us

Cyber Security

Services

Explore

Fact about us:

Lodestone Security is a wholly owned subsidiary of Beazley Insurance. Beazley wanted a technical consulting group and surveyed the market place to purchase a cyber security company that was up to its standards. When they found none, they created Lodestone Security.

Start project:

Prevention or Breach
We have you covered.
Security breaches are inevitable regardless of how well an organization protects its environment. In case of a breach, call us for immediate assistance.
We partner with our clients who enthusiastically embrace proactive cybersecurity by co-developing a dynamic security posture which can withstand regular, rigorous testing as well as current threats. Strategic security assessments, risk analysis, and a structured methodology are the foundation on which a strong security program is built.
We will execute a rapid response to mitigate losses, limit outages and determine the root cause via analysis.
png

About us

Cyber Security is our only business

Existing threats like ransomware, phishing, and malware indiscriminately target businesses of all sizes and complexity. They only care about merciless results. The number of cyber security related breaches, incidents and insurance claims has skyrocketed. Proven, high quality and effective talent to help businesses is in short supply. Seeing this gap in the marketplace, Beazley Insurance responded by founding Lodestone Security. At Lodestone, we provide professional, calm and confident support during a time of crisis, like a breach. We can also help you make impactful changes to your security posture to either prevent breaches before they occur or prevent recurrences once they have happened. An automated response is an important part of a strategy, but it takes a confident professional to boldly stand in the gap. Lodestone is ready.

Our Offerings

Strategic Security
Advisory Services

Advisory
Services

Lodestone provides strategic security counsel when clients need it most. ... Often when an organization experiences a security breach or has limited internal capabilities, clients need advice; an experienced guide to help them navigate through the information security maze and they need answers. Our seasoned professionals have the expertise of the larger firms with the nimbleness of a boutique – It's like an outsourced chief information security officer. The support can range from a simple discussion of an issue to onsite management of infrastructure installation and configuration and can take the form of regular standing meetings or ad hoc support delivered on a best-efforts basis at the time of the call. The nature of the deliverables produced can run just as widely. In all cases, Lodestone typically provides expertise that would be difficult for clients to maintain in-house.

Read More
Risk-Assessment

Risk
Assessment

Lodestone conducts Risk Assessments using any number ... of applicable frameworks (NIST Cybersecurity Framework, CIS/SANS Critical Security Controls, FFIEC/FINRA/SEC OCIE, GDPR , HIPAA,ISO 27001/27002, PCI/DSS) to help organizations determine what key assets and sensitive data are exposed and develop an approach to mitigate key vulnerabilities and threats. This strategic partnership enables clients ensure they have the right Risk Management and Governance programs to Identify, Detect, Protect, Respond, and Recover from Cybersecurity related threats.

Read More
Compliance Readiness Assessments

Compliance Readiness
Assessments

If malicious attackers were not enough to worry about, new state ... and federal privacy and cybersecurity regulations have made regulatory compliance more complicated and critical than ever before. Whether it's DFARS or FFIEC/FINRA/SEC OCIE, GDPR, HIPAA/HITECH, ISO 27001/27002, NIST 800-30 or PCI/DSS, Lodestone Security helps its clients conduct compliance readiness assessments to ensure its clients are not only secure, but able to show regulators and/or third-party partners that they've done their due diligence in not only meeting, but exceeding industry best practices.

Read More
Security Awareness Evaluation (Social Engineering)

Security Awareness
Evaluation

People errors are at the root of all security issues. Programmers make ... software development mistakes. System and network administrators misconfigure systems. Users do things that expose their computers and networks to risks; such as conveying sensitive information by telephone, complying with phishing email instructions, and accessing USB devices of unknown origin. We conduct social engineering exercises to evaluate end-user understanding of the threats posed by common activities they perform.

Read More
Security Awareness Evaluation (Social Engineering)

Security Program
Development

We conduct an assessment focusing on the strengths and weaknesses... of an existing program bounded by your organization’s overall security objectives regardless of the maturity that program has reached. We do this by evaluating existing governance, organization skills, processes, and security technology in place. We also recommend improvements in any areas where weaknesses are identified or where the program falls short of the organization’s objectives. These recommendations will help determine the right priorities and investments needed to reach the desired maturity levels and highlight initiatives for senior management to review, understand, and take action on.

Read More
Security Awareness Evaluation (Social Engineering)

Policy & Procedure Improvement or
Co-development

We evaluate the completeness and effectiveness of existing ... material to determine whether actual practices are consistent with established security guidelines. We apply best practices consistent with standards; such as, Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation(GDPR), National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO),Payment Card Industry Data Security Standard (PCI-DSS).

Read More
Posture Assessments
Web Application Assessment

Vulnerability
Assessments

External Network Vulnerability Assessment - ... We combine automated scanning with manual assessment techniques to evaluate the security of network devices and servers that are exposed to the Internet — a common point of entry for attackers. Activities include: host discovery, host enumeration, scanning for network and basic web application vulnerabilities, and manual verification of results.

Internal Network Vulnerability Assessment - An Internal Vulnerability Assessment focuses on identifying security issues that can be exploited from the perspective of a malicious insider or an attacker who has gained logical or physical access to the organization’s network. During an internal vulnerability assessment, Lodestone combines automated scanning and manual assessment techniques to evaluate the security of network devices and servers on the internal network.

Read More
Web Application Assessment

Penetration
Testing

A Penetration Test focuses on exploiting the depth of people, ... process, or technology weaknesses in an organization instead of trying to paint a broad picture of an organization’s overall vulnerability posture. Once vulnerabilities in an organization’s network infrastructure are identified, they can be exploited to gain privileged access to the internal network. Lodestone exploits these vulnerabilities and pivots between internal systems searching for sensitive information which can be stolen. This activity mimics the actions an attacker would take to obtain access to your organization’s sensitive data and network.

Read More
Network Architecture Review

Comprehensive Posture
Assessment

You worry about your company being vulnerable to cyber attacks ... and you want to execute the measures to provide the confidence that you are secure. A Comprehensive Posture Assessment approach considers the many access points into your corporate environment and we have designed this approach to cover them all.
Let's be clear, the results of any security assessment, just like a yearly medical checkup, is only a snapshot in time. These need to be redone from time to time. Your corporate technology environment is constantly evolving as the architecture changes, new hosts are deployed or retired and software patches/upgrades are rolled out. It is a dynamic environment.
Lodestone takes a comprehensive approach to review your security posture. This includes gathering Open Source Intelligence (OSINT), conducting a thorough Vulnerability Assessment to identify weak poiints and then employs Penetration testing to exploit those points in the same manner criminals would. And then there is the weakest link, people. 80% of all cyber related exploints involve humans via phishing, vishing or other social engineering testing.

Read More
Host Configuration Review

Application Security
Review

Vulnerabilities within applications can provide attackers with an entry ... point into the network; even if firewall rules are appropriate and passwords are strong. While some vulnerabilities require sophisticated knowledge and techniques, others can be discovered and leveraged with less expertise and simpler tools. We perform assessments to identify issues such as user input code injection, lack of server-side validation, poor role-based access, side channel attacks, and authentication weaknesses so they can be resolved before attackers exploit them.
Our application security testing focuses on multiple platforms including Web, Mobile, IoT, Medical Devices or others with embedded software as well as locally executed compiled applications (known as thick clients).

Read More
Network Architecture Review

Red  Teaming

Lodestone, over a 12 month period uses the approach and techniques of a determined attacker ... who's goal is to penetrate your network. Our approach uses a multi-threaded attacks, which emulate a real world threat actor’s (cyber criminals) methods to penetrate your organization. We target not just network assets to determine the risks and vulnerabilities in an organization, but also physical security access and social engineering including impersonation, phishing, vishing, and pretexting.

Read More
Web Application Assessment

Open-source intelligence(OSINT)
gathering

OSINT is data collected from publicly available sources to be used in an intelligence context....
These include: External Network Footprinting, Domain Registration DNS Mapping, Employee Information, Organization Charts, Compromised Accounts, Email, Credit Cards, Social Media Accounts, Cloud Accounts, Physical Location Reconnaissance and Visible Security Features.
Gathering intelligence about an organization is a crucial initial step an advisary conducts during an aggressive campaign to gain access to an organization's assets. The information Lodestone gathers could be used to run a phishing or social engineering campaign, expose sensitive company information or discover user credentials leading to network access before any technical vulnerability testing even begins.

Read More
Web Application Assessment

Perimeter Security
Review

Independent of individual device configuration, an organization’s ... overall network architecture can affect its security posture. Firewalls, remote access devices, network segmentation, logging and monitoring, can all impact how well an organization balances its business and security objectives.
We conduct detailed reviews to identify inappropriate defaults, obsolete rules, contradictory entries, inadequate logging, unstructured maintenance protocols, and appliance vulnerabilities. We also provide best practices recommendations related to network segmentation.

Read More

Incident Response
Web Application Assessment

IR Plan
Development

Organizations face a variety of computer security threats that impact the confidentiality, ... integrity and availability of their information technology assets. When incidents occur, organizations that can respond quickly and effectively to incidents are more likely to limit the impact of the threat and return to normal operations more quickly. A formal incident response program allows organizations to prepare themselves to respond in a predictable and effective manner to information security threats of all kinds.

Read More
Web Application Assessment

IR Tabletop
Exercise

Planning is a great first step, but testing your ability to execute that plan is equally as important.... When an organization is able to practice responding to specific incidents in a controlled environment, it has the opportunity to learn from its mistakes, refine its skills, and adjust its processes. Lodestone works with its clients to assess and refine a team’s ability to respond to incidents quickly and effectively through active, real-life scenario-based training. This service better prepares the team to respond to a real security incident.

Read More

Digital Forensics & Incident Response (DFIR)

In the event of a breach, we follow a consistent approach in investigating the event to determine scope, extent, and impact.

We assess the situation, collect initial evidence, and clarify steps to take or avoid.

Connect with us

Our Process

Our process is very clear and unambiguous. We customize each proposal to your stated needs and adjust the price accordingly.
We ensure that all the gaps are filled, the scope has been agreed to and we allow you to review and sign before each assignment.


Step 1 - Discovery

We learn what it is you need rather than simply telling you what we can do. We also size the engagement as all engagements are not alike.

Step 2 - Proposal

We list our basic services and price for the requested services that can satisfy your needs.

Step 3 - Statement of Work (SoW)

At this stage we get very detailed and specific with work and price.

Step 4 - Scheduling the Engagement

Once we have a signed SoW, we now schedule the work, delivery dates and kick-off the assignment.

Security Awareness Training

As part of our comprehensive posture assessments an organization may choose to provide end-user security training which will provide their employees with an understanding of how technology works and how their actions might compromise the security of the network. Training topics include:

An introduction to how internet technology works and the implications to anonymity and privacy, encryption, secure development, authentication and infrastructure management

Our Team

Who we are

Our team members have a great deal of experience. Our CEO was a Managing Director at Pricewaterhouse Coopers and is a database expert, our Director of Proactive Consulting is a veteran of MITRE, Travelers Insurance and our Director of Business Development is a retired Army Lieutenant Colonel who built and ran Morgan Stanley's IT Security Division and most recently was the COO for networking and incident management at Bank of America. Very broad experience focused on your problems. Our team also has various industry experience from healthcare, government, military and financial services companies. Collectively we have served companies ranging in size from 25 to 80,000 employees.


img

ALVIN FONG

Cyber Risk & Security Executive

Alvin Fong is a cyber risk & security executive/professional with over 10 years’ experience across Federal/Defense, Healthcare, and Financial Services industries. He has served in multiple security leadership roles; helping organizations mature and evolve their security capabilities. Recently he helped develop security strategy, roadmap and risk management programs for Fortune 500/Dow 30 organizations with a focus on Cyber Risks and Data Protection.

img

JOSH DANN

Incident Response Practice Lead

Joshua Dann is a cyber security professional with over 20 years’ experience in technology across multiple verticals. For the past 15 years, he has been consulting in the Information Security space, with a specialty in Digital Forensics and Incident Response (DFIR). He has provided hands-on expertise to companies ranging in size from small sole-proprietorships to Fortune 50 multi-national corporations. As a digital forensic investigator, he has responded to some of the largest data breaches in the world and assisted in the apprehension of well known cyber criminals. In 2018 Joshua created and is currently leading the DFIR practice at Lodestone Security.

img

Conor Walsh

Chief Scientist

Conor is a computer scientist with a system administrator background who has spent the past decade securing systems in the Education, FinTech, and Digital Gaming industries. His strongest skills are focused around Application Security and Reverse Engineering. Helping development teams through finding and remediating issues all across the stack by bashing, breaking, fuzzing, injecting and reversing everything from obfuscated binaries to massive applications hosting a globally distributed userbase.

img

James Habben

Head of Business Development

James Habben is the Director of Business Development at Lodestone Security. Over his 15 years of cybersecurity experience, James has been involved in some of the largest data breaches in history, providing guidance and leadership through complex challenges. In addition, he helps companies to proactively improve their cybersecurity posture through policy, process, and cross-function data breach simulations. James has spoken at many conferences on new trends and techniques, and enjoys contributing to the cybersecurity community.

Contact Us

Address

180 Saugatuck Ave
Westport, CT 06880