July 14th, 2006, 05:14 AM
Security Audit / Penetration Testing
I have been approached by a large mult inational client that would like me to conduct a security audit for them. I have conducted dozens of secuity audits in the past, but none that are remotely of this magnitude. Therefore I seek recommendations for other firms that may handle such an audit. Of course I would like recommendations from people with first hand knowledge of the proposed companies previous engagements. Obviously the client has a great deal of faith in my abilities, but it is my belief that the project is beyond my scope. I would like to gracefully decline, but at the same time I would love to provide them with a few options.
July 14th, 2006, 03:03 PM
If you are looking for first-hand knowlrdge...
the company's name might help.
Of course I would like recommendations from people with first hand knowledge of the proposed companies previous engagements.
July 14th, 2006, 03:18 PM
Suggestions for Good P-Testers
Where are you located? You would probably be looking at someone in your own country / state / whatever.
I know for a fact that Assurent (http://www.assurent.com/) is a reliable corporation that has done work for enterprise companies in Canada and elsewhere. I know for a fact that they have done government and banking clients, and numerous other global enterprises.
July 14th, 2006, 05:33 PM
Thanks for the reply, but to clarify my post I meant that I would like recommendations from people who have experience with that particular vendor.
Thanks for the reply, as I will check them out. It is a large corporation with 600 plus locations across South East Asia, UK, and the Northeastern United states. I am located in Alabama, but I don't have a prefence to the corporate location.
July 15th, 2006, 05:17 PM
BAE is excellent at this as well as ISS.
Symantec also offers this service and so does KPMG (Bearingpoint).
There are endless companies who perform this stuff worldwide. These are the few that come to mind.
Doing a full audit is VERY time consuming, especially if the client doesn't have policies in place and data classifications and such. You are looking at a heap of work (if you do the job properly). Why? You're looking at a risk assessment, vulnerability scans, threat analysis, baseline configs, policies, procedures, architecture, physical security and regulatory compliance.
Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden