ISRAELI CYBER GROUP

Together, We Have The Wisdom To Uncover, Correlate And Understand Multiple Threats

MANAGED SECURITY

RISK MANAGEMENT & ASSESMENT

DETECT & RESPONSE

ABOUT US

who we are

WE’RE PROBLEM-SOLVERS, ENGINEERS, AND INNOVATORS.

ICG IS AN AUSTRALIAN-BASED COMPANY, WITH STRONG TIES TO THE ISRAELI CYBER INDUSTRY.

ICG IS ABLE TO ASSIST ORGANIZATIONS AND PARTNERS WITH PRODUCT SOLUTIONS AND SERVICES ACROSS PHYSICAL AND VIRTUAL LANDSCAPES, TO COUNTER DEVELOPING CYBER THREATS AND ATTACKS.

THROUGH OUR VAST KNOWLEDGE AND EXPERTISE OBTAINED DURING OPERATION WITHIN CYBER SECURITY, WE PROVIDE SOLUTIONS TO ORGANISATIONS AND PARTNERS WHO ARE SEEKING RESOLUTIONS TO THEIR EVER-EVOLVING CYBER SECURITY NEEDS.

OUR EXPERTISE INCLUDE PENETRATION TESTING, APPLICATION SECURITY AUDITS, INFORMATION SYSTEMS SECURITY AUDITS, DATA LOSS PREVENTION, NETWORK SECURITY, VULNERABILITY MANAGMENT, AND MORE.

 WE WILL SUPPORT YOU WITH YOUR GOVERNANCE RISK AND COMPLIANCE REQUIREMENTS AND ARE ABLE TO BUILD AND MANAGE SECURE OPERATIONS CENTERS AND SIEMS FOR COMPANIES WANTING CONTINUOUS SURVEILLANCE.

WITH EXPERIENCE AND BUSINESS AROUND EUROPE, THE MIDDLE EAST, AND THE UNITED STATES, WE ARE A MULTI-JURISDICTIONAL ORGANIZATION THAT CAN HELP YOU ACHIEVE RESILIENCE.

THROUGH OUR VAST KNOWLEDGE AND EXPERTISE OBTAINED THROUGHOUT  YEARS OF OPERATION WITHIN THE CYBER SECURITY INDUSTRY, WE PROVIDE SOLUTIONS TO CUSTOMERS AND PARTNERS WHO ARE SEEKING RESOLUTIONS TO THEIR EVER-EVOLVING CYBER SECURITY NEEDS.

what do we offer

AT ICG, WE BELIEVE THAT AS DEFENDERS WE ARE STRONGER AS ONE.

 ICG OFFERS AN OPPORTUNITY TO BE A PART OF AN AUSTRALIAN-NEW ZEALAND-ISRAELI EXECUTIVE CYBERSECURITY COMMUNITY THAT COLLABORATES AND SHARES INFORMATION ON A REGULAR BASIS.

WE ARE WORKING IN COLLABORATION WITH THE MOST ADVANCED CYBER SECURITY COMPANIES AND STARTUPS IN THE ISRAELI ECOSYSTEM, WHO ARE LEADING SOME OF THE WORLD’S MOST ADVANCED CYBER SECURITY PRODUCTS AND SHARING DATA ON A REGULAR BASIS INCLUDING LIVE UPDATES OF PREVIOUS CYBERATTACKS AND UPDATES ABOUT NEW PRODUCTS AND DEFENSE SYSTEMS. 

WE DELIVER THE PRECISION TO END CYBER ATTACKS IN AN INSTANT – ON COMPUTERS, MOBILE DEVICES, SERVERS, AND IN THE CLOUD – TO EVERYWHERE THE BATTLE MOVES AND FIT IT TO EACH CLIENT’S PERSONAL NEEDS.

ALWAYS BY YOUR SIDE, WE HAVE BROUGHT THE WORLD’S BRIGHTEST MINDS FROM THE MILITARY, GOVERNMENT INTELLIGENCE, AND ENTERPRISE SECURITY TO CREATE A NEW KIND OF CYBER SECURITY COMPANY, ONE THAT DELIVERS FUTURE-READY ATTACK PROTECTION THAT ENDS CYBER ATTACKS ON THE ENDPOINT, ACROSS THE ENTERPRISE TO EVERYWHERE THE BATTLE IS BEING WAGED.

WE EXIST FOR ONE REASON: TO JOIN FORCES WITH YOU AND TO REVERSE THE ADVERSARY’S ADVANTAGE.

EVERY DAY, WE STRIVE TO EARN YOUR TRUST AND BE THE FIRST CALL YOU MAKE, THE FIRST TO JOIN YOUR FIGHT. 

Right Security Services

Israeli Cyber Group was created to provide its members with the right security services, adjusted and fitted by top ex-military cyber experts, and the newest and most innovative cyber startup companies and products.

Worlwide Consulting

We provide cybersecurity consulting worldwide and we target a leading position in the coming years. Our projects involved the top US government agencies, European Government agencies, Amazon, Payoneer, Paypal, and many more.

Always Up-to-Date

Our products are being updated on a regular basis, in order to assure that you are always a couple of steps ahead of any potential threats.

Most Advanced Products

We are committed to assisting your organisations with your digital transformation and providing you with the most advanced Cyber products available on the market. Our goal is to help you secure each step of that complex process.

Intelligence & Security Awareness

ICG provides a wide range of cybersecurity solutions, from governance to audit, from cyber-defense to cloud security and also covering threat intelligence and security awareness, along with risk assessment ,zero trust and prevention models that will secure your data and will keep you a couple of steps ahead Infront of any potential attack.

Join The Family

We walk together with you, and we build with you a sustainable relationship that will last over the years, bringing value to your organisation and creating a true partnership with you.

Let's start together, A journey of a strong and better cybersecurity!


The Israeli Cyber Group Club

The ICG Society is revolutionizing the way CISOs and cyber experts collaborate by placing the power in the hands of its members, providing an unrivaled experience and environment to share best practices on everything from security strategy, industry challenges, project roadmaps, technology partners, talent acquisition, investments, and more.

A community-built on core values and trust

The essence of a true community is trust. By applying strict privacy measures and instilling a member code of conduct, the ICG members can benefit from a safe environment to express their thoughts and provide insights openly and honestly.

Israeli Cyber Group in a Nutshell

Israeli Cyber Group (ICG) was founded to enable cybersecurity leaders from Australia, New Zealand and Israel, executives, startups, and VCs to have common grounds for knowledge sharing and collaborative investments in promising startups. The club members will have an opportunity to share their insights, and invest in those promising startups in the early stages and before there is a finalized product. This is an exclusive opportunity that allows ICG members to be the first ones to recognize the potential and invest before the market value had significantly increased. 

Executive Cybersecurity Club 

ICG is a closed, invite-only club.

The community is based on personal acquaintances and a review board, aimed at upholding the high bar for excellence and cybersecurity impact.

Investment Club

ICG facilitates group investments in early-stage cyber startups, providing feedback, assurance, and funding to drive their success.

Startup Mentoring

Every funded startup gains first-hand access to business executives, and security experts. ICG members, now stakeholders, provide mentoring to help create a successful venture.

Knowledge Exchange

ICG Members are provided with access to a knowledge-sharing platform to discuss challenges, strategise and compare notes with other like-minded experts.

OUR EXPERTISE

SCS- Supply Chain Security

Protect Yourself Against:

Typo squatting attacks, Malicious takeovers, ATO attacks, Makefile pollution, Bitcoin mining, Accidental injections, Botnet code injections, Environment and credential stealing, Viruses, Package tampering, Package CVEs, JavaScript CVEs, Ruby CVEs, Brandjacking, Dependency confusion.

Appsec

AppSec initiatives must focus at least on these high-profile threats to modern applications:

There are countless security threats that affect software applications. However, the Open Web Application Security Project (OWASP) Top 10 list compiles the application threats that are most prevalent and severe, and most likely to affect applications in production.

We provide guidance and individual customization to your company according to your needs, and we commit to provide you with the best and updated solutions that available on the market, with full confidentiality and discretion.

Web Application

Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code. Common targets for web application attacks are content management systems (e.g., WordPress), database administration tools (e.g., phpMyAdmin) and SaaS applications.

Perpetrators consider web applications high-priority targets due to:

The inherent complexity of their source code, which increases the likelihood of unattended vulnerabilities and malicious code manipulation. High value rewards, including sensitive private data collected from successful source code manipulation.

Ease of execution, as most attacks can be easily automated and launched indiscriminately against thousands, or even tens or hundreds of thousands of targets at a time.

Organizations failing to secure their web applications run the risk of being attacked. Among other consequences, this can result in information theft, damaged client relationships, revoked licenses and legal proceedings.

XDR

XDR is designed to help security teams with the following:

XDR was developed as an alternative to point security solutions which were limited to only one security layer or could only perform event correlation without response. It is the evolution of solutions like endpoint detection and response (EDR) and network traffic analysis (NTA).

While still useful, these layer-specific tools tend to generate greater volumes of alerts, require more time to investigate and respond to events, and require more maintenance and management. In contrast, XDR consolidates tooling and enables security teams to work more effectively and efficiently.

EDR

The Importance of EDR Security

As remote work becomes more common, strong endpoint security is an increasingly vital component of any organization’s cybersecurity strategy. Deploying an effective EDR security solution is essential to protecting both the enterprise and the remote worker from cyber threats.

EDR is designed to go beyond detection-based, reactive cyber defense. Instead, it provides security analysts with the tools that they need to proactively identify threats and protect the organization. EDR provides several features that improve the organization’s ability to manage cybersecurity risk, such as:

Improved Visibility: EDR security solutions perform continuous data collection and analytics, and report to a single, centralized system. This provides a security team with full visibility into the state of the network’s endpoints from a single console.

Rapid Investigations: EDR solutions are designed to automate data collection and processing, and certain response activities. This enables a security team to rapidly gain context regarding a potential security incident and quickly take steps to remediate it.

INCIDENT RESPONSE SOLUTIONS

We Get Incident Response Is Critical to Cybersecurity

Concentrating solely on perimeter defenses is no longer sufficient to thwart today’s cybersecurity threats. A comprehensive incident response approach requires defense-in-depth techniques. ICG service and products can help strengthen your incident response and offers components to support success.

SECURITY FOR IOT

The State of IoT Security

ICG has been analyzing data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity. This information comes from one of the world’s largest repositories of connected device data, the Device Cloud.

To date, this is the most comprehensive study of its kind. Some of the key findings include:

Smart buildings, medical devices, networking equipment and VoIP phones represent the riskiest IoT device groups.

Six of the top 10 riskiest IoT device types fall into the categories of medical devices and networking equipment.

Windows workstations represent a major cybersecurity risk to organizations, with over 30% of managed devices in manufacturing and over 35% in healthcare running recently unsupported Windows versions.

Commonly exploited network services like Telnet are found in all five industry verticals.

SAAS SECURITY

Security concerns about Software as a Service (SaaS) in the banking and financial services sector have less to do with technology than with business culture, governance, and compliance.

So, on-premises or cloud?

And if cloud, what kind of cloud?

An on-premises system is like being the owner-occupier of a house. You are uniquely in charge of security. But what quality of security technology can you afford? SaaS, by contrast, is like a multi-tenant system, where a landlord or facilities manager provides security with specialist assistance. That means you have outsourced responsibility for building access control to a manager with the latest, multi-level access technology, and the best security skills. At the same time, you control who can and cannot enter your own part of the building.

Which one do we prefer?

After many years of skepticism and hesitation, banks are increasingly opting for the multitenant option. SaaS is now driving a disruption in the global financial services IT landscape. Banks were held back because of a misconception that the cloud, and in particular the public cloud, is insecure. That misconception has changed rapidly, but banks are still well advised to proceed with caution. Banks, which have a long standing culture of high security, want to be sure that the SaaS vendors and cloud infrastructure providers they work with are as committed to security as they are themselves.

Cost is a major driver of migration to the cloud. All banks interviewed in a recent survey by Moody’s Analytics stated that they were migrating to the cloud to minimize IT costs, including the cost of data centers, hardware, staff, legacy systems, and expensive software licenses.

Yet, cost is far from being the only reason to migrate to cloud. Many banks want to achieve greater business agility through the flexibility and scalability that cloud deployments provide: the ability to upscale and downscale IT services as and when required. Others believe that cloud deployments allow them to develop products faster and meet customer demands in a timelier manner. Cloud is also seen as a lever for innovation, partnering with cloud vendors to co-develop products and services.

 

NDR

Network detection and response (NDR) solutions use a combination of non-signature-based advanced analytical techniques such as machine learning to detect suspicious network activity. This enables teams to respond to anomalous or malicious traffic and threats that other security tools miss.

What does an NDR solution do?

NDR solutions continuously monitor and analyze raw enterprise network traffic to generate a baseline of normal network behavior. When suspicious network traffic patterns that deviate from this baseline are detected, NDR tools alert security teams to the potential presence of threats within their environment.

Why do you need an NDR solution?

Networks are extending into the cloud and continuously growing in both size and complexity. This has led to an unprecedented volume of data traversing the distributed network and created a perfect environment for malicious actors to hide in. NDR solutions solve this problem by collecting telemetry from network devices and applying analytical techniques like machine learning to detect threats that other tools miss.

How does NDR enhance your security?

NDR solutions and tools can:

Detect anomalous network traffic that traditional tools miss by applying non-signature-based detection techniques such as behavioral analytics and machine learning.

Model a baseline of what normal network behavior looks like and alert security teams on any suspicious traffic that falls outside of that normal range.

Monitor all traffic flows—whether entering and exiting the network or moving within the network—so that teams have the extended visibility needed to identify and mitigate security incidents, regardless of where a threat originates.

Analyze raw network telemetry in real-time or near real time and provide timely alerts to allow teams to improve incident response times.

Attribute a malicious behavior to a specific IP address and perform forensic analyses to determine how threats have moved laterally within an environment. This allows teams to see what other devices might be infected, leading to faster incident response and threat containment, and better protection against unfavorable business impacts.

Provide response capabilities that can enhance manual incident response and threat hunting efforts or streamline operations and save teams time through automation.

Our expertise includes penetration testing, application security audits, information systems security audits, data loss prevention, network security, and more and more. We are able to support you with your governance risk and compliance requirements and are able to build and manage Secure Operations Centres and SIEMs for companies wanting continuous surveillance.

STARTUPS & VENTURE CAPITAL

WE INVEST IN DISRUPTIVE COMPANIES THAT BECOME TOMORROW’S MARKET LEADERS

Emerging cybersecurity companies have options for where they take funding from.

ICG brings much more than funding and is unlike any other strategic investment firm. We provide infrastructure for market readiness, cybersecurity engineering expertise, and go-to-market muscle for all our partners.

Try the product that you are investing in before you invest in it.

At ICG, we have our finger on the pulse of what’s next in cybersecurity. We scour the globe for the world’s most innovative emerging cybersecurity technologies. We then strategically invest and rapidly scale them – dramatically increasing their valuation while equipping enterprises with unique ways to solve critical cybersecurity challenges.

OUR PROCESS

ICG© Aims to have a highly transparent process to enable all founders and entrepreneurs to grow, irrespective of whether we will invest in their venture or not. As a part of the process we will execute:
  • A preliminary Investment Assessment and profile.
  • In the first stage, ICG is aimed at inspecting prospect startups at a high level, validating their compliance with the ICG minimal requirements:
  • Product / Service / Solution for the cybersecurity industry.
  • Proof Of Concept (POC).
  • Looking for early-stage investment (Pre-Seed / Seed / A-round).
  • Full diagnostic of the people and the team structure.

 

COLLECTIVE DILLIGENCE

Chosen Startups will be invited to share their vision and demo their product in front of ICG members. Startups are evaluated based on multiple dimensions, including:
  • The founding team
  • Total Addressable Market and go to market strategy
  • Alignment with ICG member views of the industry needs
  • Technological Supremacy & Innovation
  • Strong Financial Plans
  • Risk assessment and damage limitation
  • Potential to grow
  • A sustainable and ethical businesses
  • Long term vision

Investment

ICG members will have the option to invest in a startup, and provided a sizeable amount of money has been allocated by ICG members; the investment will take place.

As a group, ICG will also advise other prospective VC investors who may want to invest in the round. 

Mentoring & Support

ICG members (now stakeholders) will be looking forward to mentoring, supporting, and promoting the funded startups and helping them grow by providing technical and strategic guidance. In addition, ICG helps to professionalize the management, business culture,  recruiting talent process, and much more.

 

CONTACT US

Get in touch or contact us for general inquiries

ICG IS SYDNEY BASED 

APPLY TO join the club

ICG is able to offer product Solutions & Services with any cyber threat Inquiries

Israeli Cyber Group 2022© 

 All Rights Reserved