Overview
Threat modeling is something we do every day whether we realize it or not.
When we see dark skies and bring an umbrella, we are threat modeling.
Threat modeling asks, “What are we doing,” “What can go wrong,” and “What will we do about it.”


Model All Phases of a Breach
1. Enterprise (Detection & Prevention)
Model all phases of a cybersecurity breach, including obtaining remote network access, evading detection, lateral movement, and the attacker’s pursuit of its objective. This activity is a tabletop exercise including members of your SOC and Incident Response teams and Icebreaker’s red team experts that specialize in breaching enterprises. We will discuss likely attacks against your organization, map your existing countermeasures, and determine the levels of residual risk. The output of this activity is a prioritized action list of remediations for the vulnerabilities identified during the exercise.
2. Enterprise (Response)
If disaster strikes, will you be prepared? Understand how to respond to a ransomware attack or other breach. This is a tabletop exercise between your executives and Icebreaker’s partner FlashPoint. FlashPoint has vast experience helping Fortune 500 companies respond to ransomware attackers, including providing intelligence on the threat actor, their attacks on other organizations, facilitating negotiations, and facilitating cryptocurrency ransom payments.
3. Application
Catch and fix application security issues in the design phase. A tabletop exercise including your development team and Icebreaker’s application security experts. Identify all components of a system, potentially including web applications, APIs, mobile, cloud, and other components, and model the threats for each. Anticipate your attacker’s moves and design the system to prevent attacks from succeeding.
Risk ready clients.
CIO, Financial Services Company
“Very, very, very good and helpful. I’m kicking myself; we should have done this a year ago. Thank you for helping my team get to the next level.”
CIO, Gaming Company
“I’m really impressed with how thorough this was. Excellent job. I’m really, really happy”
CISO, Technology Company
“Thanks for this excellent, clear and well thought out input. The report was a gut punch but fair. We don’t even have any constructive criticism for you; this was great.”
Exceptional service built to go the distance
Our team is dedicated to service and enabling an organized, streamlined process, allowing us to provide a superior customer experience.