Katas refer to patterns, habits or routines used to create muscle memory. We internalize this meaning to create efficient cybersecurity practices so that it becomes muscle memory.
Cyber Defense Training
The most prevalent way attackers are able to infiltrate organizations is through human error. All it takes is one person to miss one suspicious IP address or to see something and not report it. We will assist with anything from consulting with C-suite executives on vulnerability assessments to providing cyber defense training to your IT teams.
Training in Threat Hunting & Incident Response
Ensuring the security of your organization is hard enough with the plethora of cyber threats in the wild. We can assist with implementation of security tools (SIEM / SOAR / IPS / EDR) that keep your organization secure while you sleep. We train personnel on how to properly identify threat patterns, IOCs / IOAs, how to triage a threat and how to properly go through the steps of eliminating a threat.
War Games
At Cyber Kata we believe that live fire exercises are more than just a game. Repetition and guidance through experienced red and blue team veterans is how we scope war games. These games will be demonstrating to your team how threat actors have various approaches to infiltrate your organization(Red teaming). Or vice versa, we will be on the defensive to challenge the capabilities of your red team to provide them with different defensive countermeasures.
Summary
Experience
Mission: Cyber Kata is a minority and veteran-owned company. We provide cyber security services, defense training, War Games, and a focus on Adversary Simulation. Cyber Kata is a growing company that strives for ‘Excellence in All We Do’.
We focus on defensive cyber security through live instances of how a cyber security team or blue team would respond to an active threat. We will be hosting hands-on events including a live fire cyber security attack to simulate how a threat actor would infiltrate. We also provide Applied AI tactics to assist organizations both in defensive and offensive tasks and projects. War game simulations are important to understand the inner workings of how a tactical engagement is carried out to test or improve expertise. We adopt this to train analysts & engineers on the inner workings of tactical engagements between malicious actors and defenders.
At Cyber Kata we are driven to make a positive impact and do great things.
My story
douglas kaluhiokalani
I am a United States Air Force combat veteran of Japanese, Hawaiian, and German descent. I am a Senior Advisor on the U.S.A national Blue Team for a NATO CCDCOE cybersecurity exercise called Locked Shields. I created Cyber Kata to help organizations with the necessary training and awareness to recognize cyber threats before it is too late. Many companies rely too much on security software tools to stop everything. We are here to help organizations recognize that their personnel need to have well-rounded training and awareness to stop cyber threats effectively.
I have 15 years in cybersecurity. 10 years have been in defensive cybersecurity and the past 5 years have been in offensive cybersecurity TTPs. I am certified in threat mitigation, incident response, cybersecurity defensive countermeasures, automation of security triggers, protecting of digital assets, identifying critical assets, and offensive cybersecurity capabilities to identify vulnerabilities.
Additional Services
Cyber Defense Training
Mentoring of IT teams in bolstering defenses. Tutorial on creating toolkits for various situations. A playbook on defending critical sector pertinent assets from exploitation of a vulnerability.
Cyber Security Consultation
This service is to identify problems, evaluate security issues, assess risk, and speak with C-suite executives about how to present findings.
Threat Hunting & IR Training
Training of personnel on how to implement security tools effectively, threat hunting & IR tactics based on MITRE ATT&CK framework, and how to identify IOCs & IOAs.
Custom Build-out Environment
Simulating live examples of how nation-state actors may target your organization. This will be creating a virtual sandbox environment that is similar to your environment. This will be a 2 - 4 hr exercise assessing how well you would do if you had to defend a critical sector or assets of your organization.
Custom Team Building Exercises
The most prevalent way attackers are able to infiltrate organizations is through human error. All it takes is one person to miss one suspicious IP address or to see something and not report it. With our top level training from experts that have been at NATO cybersecurity exercises we can train your team on how see signs and report it.
Vulnerability Assessments
We can perform vulnerability tests to identify exploits within your organization and a report to go over findings and lessons learned.
Live Threat Sessions
Live recorded sessions of a test box that the blue team has to defend against a live attack Live recorded sessions of a test box that a red team has injected malware / exploits and the blue team has to triage and remediate.
SIEM & SOAR Implementation
Helping your organization's IT team to install and implement SIEM & SOAR platforms. We are versed in MS Azure Sentinel, IBM QRADAR, Dragos, Splunk, and other top industry leading software tools.
Newsletters
Red Team Tactics
Cyber Kata
Partnering Organizations
Make Cyber Defense your KATA
Milestones
Feel free to also leave us a message on our social media pages as well.