cst-360.com Open in urlscan Pro
35.245.187.85  Public Scan

Submitted URL: http://www.cst-360.com/
Effective URL: https://cst-360.com/
Submission: On March 26 via manual from IL — Scanned from IL

Form analysis 2 forms found in the DOM

POST

<form data-form_id="2" id="fluentform_2" class="frm-fluent-form fluent_form_2 ff-el-form-top ff_form_instance_2_1 ffs_default ff-form-loaded" data-form_instance="ff_form_instance_2_1" method="POST">
  <fieldset style="border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;">
    <legend class="ff_screen_reader_title" style="display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;">Weekly Newsletter (#2)</legend>
    <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1711462870335"></p><input type="hidden"
      name="__fluent_form_embded_post_id" value="238"><input type="hidden" id="_fluentform_2_fluentformnonce" name="_fluentform_2_fluentformnonce" value="19f26a7b6b"><input type="hidden" name="_wp_http_referer" value="/">
    <div data-type="name-element" data-name="names" class="ff-field_container ff-name-field-wrapper">
      <div class="ff-t-container">
        <div class="ff-t-cell">
          <div class="ff-el-group ff-el-form-hide_label">
            <div class="ff-el-input--label asterisk-right"><label for="ff_2_names_first_name_" aria-label="First Name">First Name</label></div>
            <div class="ff-el-input--content"><input type="text" name="names[first_name]" id="ff_2_names_first_name_" class="ff-el-form-control" placeholder="First Name" aria-invalid="false" aria-required="false"></div>
          </div>
        </div>
      </div>
    </div>
    <div class="ff-el-group ff-el-form-hide_label">
      <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_2_email" aria-label="Email">Email</label></div>
      <div class="ff-el-input--content"><input type="email" name="email" id="ff_2_email" class="ff-el-form-control" placeholder="Email Address" data-name="email" aria-invalid="false" aria-required="true"></div>
    </div>
    <div class="ff-el-group ff-text-left ff_submit_btn_wrapper"><button type="submit" class="ff-btn ff-btn-submit ff-btn-md ff_btn_style">Join Now</button></div>
  </fieldset>
</form>

POST

<form data-form_id="1" id="fluentform_1" class="frm-fluent-form fluent_form_1 ff-el-form-top ff_form_instance_1_2 ffs_default ff-form-loaded" data-form_instance="ff_form_instance_1_2" method="POST">
  <fieldset style="border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;">
    <legend class="ff_screen_reader_title" style="display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;">Contact Us (#1)</legend>
    <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="1711462870335"></p><input type="hidden"
      name="__fluent_form_embded_post_id" value="238"><input type="hidden" id="_fluentform_1_fluentformnonce" name="_fluentform_1_fluentformnonce" value="19f26a7b6b"><input type="hidden" name="_wp_http_referer" value="/">
    <div data-type="name-element" data-name="names" class="ff-field_container ff-name-field-wrapper">
      <div class="ff-t-container">
        <div class="ff-t-cell">
          <div class="ff-el-group ff-el-form-hide_label">
            <div class="ff-el-input--label asterisk-right"><label for="ff_1_2_names_first_name_" aria-label="First Name">First Name</label></div>
            <div class="ff-el-input--content"><input type="text" name="names[first_name]" id="ff_1_2_names_first_name_" class="ff-el-form-control" placeholder="First Name" aria-invalid="false" aria-required="false"></div>
          </div>
        </div>
      </div>
    </div>
    <div class="ff-el-group ff-el-form-hide_label">
      <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_1_2_email" aria-label="Email">Email</label></div>
      <div class="ff-el-input--content"><input type="email" name="email" id="ff_1_2_email" class="ff-el-form-control" placeholder="Email Address" data-name="email" aria-invalid="false" aria-required="true"></div>
    </div>
    <div class="ff-el-group ff-el-form-hide_label">
      <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_1_2_phone" aria-label="Phone/Mobile">Phone/Mobile</label></div>
      <div class="ff-el-input--content"><input name="phone" class="ff-el-form-control ff-el-phone" type="tel" placeholder="Phone Number" data-name="phone" id="ff_1_2_phone" inputmode="tel" aria-invalid="false" aria-required="true"></div>
    </div>
    <div class="ff-el-group ff-el-form-hide_label">
      <div class="ff-el-input--label asterisk-right"><label for="ff_1_2_description" aria-label="Message">Message</label></div>
      <div class="ff-el-input--content"><textarea aria-invalid="false" aria-required="false" name="description" id="ff_1_2_description" class="ff-el-form-control" placeholder="Your Message " rows="4" cols="2" data-name="description"></textarea></div>
    </div>
    <div class="ff-el-group ff-text-left ff_submit_btn_wrapper"><button type="submit" class="ff-btn ff-btn-submit ff-btn-md ff_btn_style">Send</button></div>
  </fieldset>
</form>

Text Content

Let's Plan Your Security

Let's Plan Your Security



LEVERAGE YOUR BUSINESS WITH CYBER SECURITY

Implementing security that enables business services and products.

Let's Plan Your Security







ARE YOU TAKING CYBERSECURITY SERIOUSLY ENOUGH?



With emerging cyber threats and complex business environments, it is harder and
harder to feel safe. businesses experience cyber incidents and are exposed to
business disruptions all day and everyday. Furthermore, the fact that humans
(employees) can be easy manipulated does not make organizations feel safer.


People don't like to deal with something they do not understand. However Cyber
Space is where today's business is being done and...


any business in that space should be well protected.


Let's Plan Your Security


ENABLING BUSINESS SERVICES AND PRODUCTS



a
Business and Technology goals and measurement Alignment.


b
Security that drives new business opportunities and initiatives.


c
Technological visibility for better decision-making processes.


Let's Plan Your Security




THERE IS NO PERFECT CYBER SECURITY!




WITH SO MANY THREATS ORGANIZATIONS FACE TODAY, NO WONDER SO MANY OF THEM FEEL
HELPLESS.

As developers of cybersecurity methodologies for the Israeli Defense Forces
(IDF), governmental bodies and many commercial organizations from diverse
sectors, using advanced and innovated approaches and technologies, we believe
that we can meet your needs and proactively assist in making your business
operations much more secured.


Let's Plan Your Security
Some of our beloved clients: 

Israel Defense Forces C4I
Leading the Cyber Defense Doctrine Development
Israel National Cyber Directorate
(INCD) - Cyber Security Training
Ministry of Foreign Affairs
Planning SOC Methodology and Implementation
Post Luxembourg
Planning Digital Transformation based on Cyber Security + Risk Management
Training
EMC Cyber Solution Group
Developing Ministry of Energy SOC Processes.
Amdocs
Implementing a new Risk Model + Cyber Security for Internal Audit Training
Avid Technologies Inc
Developing Cyber Security Strategy and Yearly Work Plans
Israel State Comptroller
Israel National Law Enforcement Cyber Readiness Assessment
PicUP
Start Up Security Compliance and Business Development Advisory
Psagot Ivestment House
IT Risk Management Processes
1 2 Next »

And this is what they are saying...




HOW CAN WE LEVERAGE YOUR BUSINESS?



Our cybersecurity main services...


CYBER PROGRAM GOVERNANCE


CYBER PROGRAM GOVERNANCE


Governing Cyber Security just like any other process

Read More

CYBER READINESS ASSESSMENTS


ASSESS AND MITIGATE YOUR CYBER RELATED RISKS


Implementing security that enables business services and products.

Read More

CYBER CONTROL IMPLEMENTATION


LEVERAGE YOUR BUSINESS WITH EXISTING SECURITY TOOLS


CST-360 vast experience with security control's implementation is aligned with
leading practices, frameworks and standards. We will guide you with choosing,
integrating and combining leading security control environment , while building
your own use cases. Our focus will be to leverage what you already have to
empower your business.

Read More

CLOUD SECURITY


SECURING CLOUD SERVICES TO ENABLE BUSINESS GROWTH


CST-360 provides cloud security Governance, defining the the boundaries of
organization’s cloud environments, regardless of the service provider. Once
defined, we assist in installing, configuring and implementing appropriate cloud
security controls that enables business services and usage in a secure manner.

Read More

CYBER AUDIT SUPPORT


CYBERSECURITY AUDIT AS A SERVICE


CST-360 has the technological know-how and the business understanding in order
to walk-through cyber audit support. Our certified team can assist your audit
function in leveraging cyber related risk into controlled business environment
assurance.

Read More




HOW DOES IT WORK?



With security strategy aligned with business objectives, repeatable risk
assessments and managed operational cybersecurity processes, you could never go
wrong. That is my job and we will always be there for you.

1
Schedule Your Security Planning


2
Evaluate Current State


3
Develop and Pursuit a Governed Program


Let's Plan Your Security


OUR FINEST WORK



Here are some case studies on our latest projects.


Sample Project

Sample Project Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean
commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis
dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec,
pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede
justo, fringilla vel, aliquet nec, vulputate eget, arcu. In […]

Read More

More Case Studies




QUESTIONS TO ASK YOURSELF ABOUT YOUR SECURITY POSTURE




WHAT IS CYBER SECURITY GOVERNANCE?

Governance is set practices intent to provide strategic direction, boundaries to
work in and time frame to achieve certain goals and objectives. CyberSecurity
Governance refers to the practices that addresses organizational usage of
cyberspace, its digital presence and the business opportunities and risks they
bring. In today's business world, digitization is everywhere. Most business
processes are computer based and relay on massive amount of data, therefore are
part of the cyberspace and digitization. Cybersecurity governance may also be
referred as information security governance. The difference is negligible and
insignificant. While implementing Cyber Security Governance we strive to include
the monitoring of goals achievement, risk management, resource allocation, roles
and responsibilities, performance indicators, managerial communication and any
other valuable measurement.

WHAT ARE CYBER READINESS ASSESSMENTS?

Cyber Readiness Assessment are momentary snapshots of your cybersecurity
activities and resilience capabilities. Cyber Security Readiness Assessment is a
comprehensive evaluation of your security program maturity, finding ways to
improve your containment and eradication of cyber incidents and identify other
places that can increase the chance of overcoming any cyber related business
disruption. While risk assessments present any risk to the business, readiness
are more about resilience from cyber threat exploits, regardless of the risk it
poses. A cyber readiness REPORT is highly valuable for governing bodies (such as
BoD, Audit committees, Federal agencies, Regulators, etc.) as they evaluate your
resilience capabilities.

WHAT IS CYBER RISK?

There is no cyber risks. Only Business risks. The right term to use is - Cyber
related business risks. Risk is a calculation of several vars. The fundamental
one is the impact on the business. Risks are scenarios in which there is a
negative impact the business. Risks are business language. On the technological
language we can find mainly vulnerabilities and weaknesses. When a vulnerability
is exploited it may cause negative impact on the business. That is when cyber
vulnerability becomes a business risk.

Let's Plan Your Security


LEVERAGE YOUR BUSINESS WITH CYBER SECURITY


Implementing security that enables business services and products.


Let's Plan Your Security




BUSINESS ROI WITH CYBER SECURITY



Enjoy our Blog

April 18, 2020
Is office space part of your strategy?

Could it be that organizations do not need office space anymore? Would it be
fair to say that we can reduce a substantial part of our leased space costs?
Imagine this: our employees are working remotely. Part of them are working from
home, others sit in coffee houses or leased spaces next to their home. […]

March 1, 2020
Cyber Hygiene - Cloud

Do teeth brushing and cloud security correlate? Can teeth brushing save us
money? Hey everybody. I'm Yoav and this the last and not least of our cyber
hygiene post serious. This one is on implementing cyber hygiene on cloud
environments. On our previous post “cyber hygiene – actions” we learned how good
security practices and […]

February 17, 2020
Cyber Hygiene Actions

Hey you all, Its, Yoav. Thank you for coming back. On this post I will tell you
how simple hygiene actions (with no additional tools required) can be
implemented within your network, preventing digital illness and unnecessary
disruption exposure. On our previous post, Cyber Hygiene basics, we saw the
similarity between body hygiene and network […]

Visit Our Blog 


LEVERAGE YOUR BUSINESS, 
WHILE PROTECTING WHAT MATTERS



Let's Plan Your Security




FEATURED LINKS

 * Home
 * Services
 * Projects
 * Blog
 * About CST360
 * Clients
 * Testimonials
 * Contact Us

OUR SERVICES 

 * All Our Services
 * Cyber Program Governance
 * Cyber Readiness Assessments
 * Cloud Security
 * Cyber Control Implementation
 * Cyber Audit Support

FORM OUR BLOG

 * Is office space part of your strategy?
 * Cyber Hygiene - Cloud
 * Cyber Hygiene Actions
 * Cyber Hygiene Basics
 * Security Software as a Service

WEEKLY NEWSLETTER


Join Now
We’ll send you our weekly email newsletter and occasional some marketing
communications, in accordance with our Privacy Policy.


LET'S PLAN YOUR SECURITY




WEEKLY NEWSLETTER


Add your name and best email to join our list.

Weekly Newsletter (#2)

Δ

First Name

Email

Join Now


 * Home
 * Services
 * Projects
 * Blog
 * About
 * Clients
 * Contact Us

2024,
CST-360
 * About
 * Privacy
 * Disclaimer
 * Terms
 * Contact

Visit our FacebookVisit our TwitterVisit our LinkedIn
English
Powered by:
Simply - Digital Workshop

Hebrew 


CONTACT US

Please enter your message and details here:
Contact Us (#1)

Δ

First Name

Email

Phone/Mobile

Message

Send


checksignallockpluseyeretweetcogscommentsthumb-tackunlockunlock-altcopyrightcalendar-plus-ocross
linkedin facebook pinterest youtube rss twitter instagram facebook-blank
rss-blank linkedin-blank pinterest youtube twitter instagram