Our teams find vulnerabilities in systems and physical spaces that impact your security, safety, business and reputation.
Digital & Physical security team
Like an adversary, Akagi Group specialists identify patterns that yield vulnerabilities. The gaps within an organization’s technology, policies, plans and how people affect them are observed, learned and exposed learn. We stress-test established protocols. From strictly theoretical to implemented, we specialize in digital intrusion, physical security assessments, and social engineering. Our service collection is geared to produce resilience, situational awareness in the location where your organization is and to be better prepared to handle the unknown. TAG services are geared to two primary objectives: establish a risk baseline and impacts that are present from the different attack surfaces available to attackers and provide recommendations for remediation of all tiers. Second, train the incident response capability to breach response and exercise the organization’s overall security program.
The Akagi Group adversarial emulation cell is comprised of specialists in physical bypass, digital warfare and trust exploitation. Members include: current/former military cyber protection team members, Intelligence Community operators, private sector penetration testers and considerable figures in the information security industry. Akagi Group cells offer a thorough understanding of the adversarial mindset, allowing us to operate with stealth and sophistication, and to profile our clients’ infrastructure and users undetected. Our team then devises custom approaches considering the real attack vectors used against each client’s business. We show all of our work — demonstrating the real risk involved and the ideal countermeasures.
Notably, the physical security cell portion of The Akagi Group has extensive global experience performing vulnerability assessments for facilities in the UK, Taiwan, Spain, Israel, Africa, Netherlands, Libya, Poland Georgia, Romania, Ukraine, Latvia, as well as nuclear facilities in the United States and the UAE.
Red Teams
Incident Response and Threat Investigations
Threat Hunting
Managed Active Defense
Technical Programs Auditing
Regulatory and Policy Assessment
Executive Management Engagement
Risk Management